General

  • Target

    d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118

  • Size

    1.4MB

  • Sample

    241207-nzwfpswrgj

  • MD5

    d24fc8737f2e7f453fe3688ac4c39736

  • SHA1

    dc7b7a4ba33610500900d76e871523c2d1fb9f65

  • SHA256

    f554af43cf1397d00309fdb967a62a825f4cf06100bab5e8fff17a9faa56d0f7

  • SHA512

    a9c49f600277f40800036208c57e81cc844bab33f1860fbe0162f75a2d2c2574b9d3a987c996e9b793e1071b9663f69bdf3322036ee71e8935778be96a7086fd

  • SSDEEP

    12288:ReaRNdAHjDJW7nUyeSqffN8Yj1pmjEd53kJSr1sRYAT2fXkk/HmUVpmldEVRCG:RnR8HmfqfV5jyjEd5OYAT2fXkvOH

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

earz

Decoy

halacoupon.com

anthos-labs.com

hagertylabs.net

l1992.com

856379580.xyz

rcbb-technologies.com

realhoggapparel.com

sauceprince.com

tootingcab.com

4chase5.com

ordergogibibimbap.com

nyj.xyz

dermixspa.com

premiergiftingco.com

razorcentric.com

mbrealtyadvisors.com

officialjazz.club

cctv006.com

hbcuatthepolls.info

prestamos-ya.com

Targets

    • Target

      d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118

    • Size

      1.4MB

    • MD5

      d24fc8737f2e7f453fe3688ac4c39736

    • SHA1

      dc7b7a4ba33610500900d76e871523c2d1fb9f65

    • SHA256

      f554af43cf1397d00309fdb967a62a825f4cf06100bab5e8fff17a9faa56d0f7

    • SHA512

      a9c49f600277f40800036208c57e81cc844bab33f1860fbe0162f75a2d2c2574b9d3a987c996e9b793e1071b9663f69bdf3322036ee71e8935778be96a7086fd

    • SSDEEP

      12288:ReaRNdAHjDJW7nUyeSqffN8Yj1pmjEd53kJSr1sRYAT2fXkk/HmUVpmldEVRCG:RnR8HmfqfV5jyjEd5OYAT2fXkvOH

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks