General

  • Target

    e19747635460470bc0ea6c9683b9b414_JaffaCakes118

  • Size

    293KB

  • Sample

    241211-qagblatlg1

  • MD5

    e19747635460470bc0ea6c9683b9b414

  • SHA1

    308c6dd5dcdfcfb45e80ae79baed77298c9a635a

  • SHA256

    3702ad039d81610d021695e029ffd675fd9fc54cc892b82c5e73d49bb75bd87c

  • SHA512

    0ec83bcbcb55c028f97b6b773648a327f3c2225599bcad481771fe18c650484ca710feb18b93d57444431b128590f474b2c17ed6cfbba3b66266c145278d7870

  • SSDEEP

    3072:RfpY0QDtRg6v4GoODrKG2LL9FPSAFzvhQ6JzztLndCvnnS+PVMbCwLvcHS/amTwk:Z6fRiOnm1xBndCvnnSc3CttwHyP6FLI

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

rvoe

Decoy

frogsstoreonline.com

emprendedorasdehogar.com

buseselvi.com

test-chase.com

redevelopment37subhashnagar.com

teacheex.com

trabzonlife.com

pfriendship.com

wholesomepantrys.com

chrislambright.com

companysoftwaresmount.com

daylamiagency.com

emoblow.com

lesbicas.online

muhamadruli.com

lkpayonline.com

aymankatwa.com

illuumi.com

finegoodses.store

patcoins.com

Targets

    • Target

      e19747635460470bc0ea6c9683b9b414_JaffaCakes118

    • Size

      293KB

    • MD5

      e19747635460470bc0ea6c9683b9b414

    • SHA1

      308c6dd5dcdfcfb45e80ae79baed77298c9a635a

    • SHA256

      3702ad039d81610d021695e029ffd675fd9fc54cc892b82c5e73d49bb75bd87c

    • SHA512

      0ec83bcbcb55c028f97b6b773648a327f3c2225599bcad481771fe18c650484ca710feb18b93d57444431b128590f474b2c17ed6cfbba3b66266c145278d7870

    • SSDEEP

      3072:RfpY0QDtRg6v4GoODrKG2LL9FPSAFzvhQ6JzztLndCvnnS+PVMbCwLvcHS/amTwk:Z6fRiOnm1xBndCvnnSc3CttwHyP6FLI

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks