General
-
Target
JaffaCakes118_3e4d822608eabbd09ec42b37c1e935582e32e4f75a2d1248e261814faead9d4b
-
Size
460KB
-
Sample
241225-pyvnfstjbs
-
MD5
51a262fd5b8d86c7b2fd6ce8f967a3bb
-
SHA1
e63d4018866ca7ba679c9d53db9d916a848f8304
-
SHA256
3e4d822608eabbd09ec42b37c1e935582e32e4f75a2d1248e261814faead9d4b
-
SHA512
b40ec57074357b48f77441743c695b266b7393841aa281d9d6391531930a5bb6a7a31e0da964e6c943992d7becfbc035ce21543123e8c63a08329ce16c7b4b0f
-
SSDEEP
12288:/B4xWPDKxdTTmxvZBDC9m1A8KWclWd+gm2z1AGwMia:J4QmZm7BrTLcc+gm2z1Ar2
Static task
static1
Behavioral task
behavioral1
Sample
2869e0c3e746c3baa787fb20464d3b4b286591d96f1ea89b8d852bcae32f4ef0.exe
Resource
win7-20240903-en
Malware Config
Extracted
xloader
2.5
mwfc
a-great-intl-voip-phones.zone
police-trust-security.com
415391.com
coi-sl.com
liming-steel.com
criticalracetheoryexplained.com
pintoent.com
columbusrx.com
clarktribe.net
texasforblanchard.com
musical.voyage
priyamblogs.com
employbridge.works
americanchessmaster.com
australiaaddictioncenters.com
drkell-yann.xyz
barryisdaner.com
frankkystein.art
aromatoto7.com
alsuwal.com
dmsolutionsco.com
learnwithvr.net
bigsouthfiresafety.com
atthelastmoment.com
ktnpan.xyz
xinhuishaoyu.com
humanlydivine.com
exitin90.com
wzly.top
blockzcoin.com
edm69.net
bewitchedkit.com
alpeshpate.com
realbeaches.com
bluejaerial.com
amazonjp-securities.net
forbeautii.com
kincsemto.net
playandwin-with-o-tentic.com
herauniversal.com
acs-storage.com
riulaza.com
bedrocksolution.net
xn--latamazulea-beb.com
deniyayatea.com
bubbledenterprise.com
ternopil.agency
freeminingboxes.com
suddennnnnnnnnnnn35.xyz
firstparkcondos.com
starpointeartsacademy.com
3ptsstore.com
cryptocurrencyscamreport.com
helennbendiss47.xyz
intergoldenstateautosales.com
lsmith.xyz
cuantiao.com
xn--z92b76hzfnc1y211an8i78t.com
noon21-203.com
boardsnourhood.com
toddlyonsfishing.com
levancanh.xyz
siteahan.com
winsportgame.club
malagainvestments.com
Targets
-
-
Target
2869e0c3e746c3baa787fb20464d3b4b286591d96f1ea89b8d852bcae32f4ef0
-
Size
495KB
-
MD5
1d4fd5f9ce67b9701527fe44c5c01328
-
SHA1
cd0b4fb2f1ba6d54310cd4cad70e375c7da3e5ef
-
SHA256
2869e0c3e746c3baa787fb20464d3b4b286591d96f1ea89b8d852bcae32f4ef0
-
SHA512
e43d10db454ab5d025f5043812c0ad116102b09230bb1b1e72760d000f9de41b172e1d6bccc05b5504fcf67ec0a2620275f85078f4adc3d7b2ec433ac498b0f5
-
SSDEEP
12288:3gfm1GNmrNm2r5t8v+vtrqt6QuQnKTrMqTUcvJbNm:mgHkSt0+vtBTrpUci
-
Xloader family
-
Xloader payload
-
Suspicious use of SetThreadContext
-