General
-
Target
JaffaCakes118_aef989d19eb5f5d3042ccb78cb984327a90cf1946522c42bd34bed927fe80c0b
-
Size
389KB
-
Sample
241230-avbnva1ras
-
MD5
1e8d8c72c395272f7b968aafd7ef26b7
-
SHA1
8ffa2fa227821c90c54d44084b13c0d1241be782
-
SHA256
aef989d19eb5f5d3042ccb78cb984327a90cf1946522c42bd34bed927fe80c0b
-
SHA512
d92553f001f7f85f6bc145468babb3955dab95b7318f62e3772a9e75f933b41b1232530a7a401acd8a44bd630bdc070127bd3001d758edb3611fc434ad873439
-
SSDEEP
6144:ixoMz9UaHz4ETSGNOtZ1551T8jhmWCQfCxlwNVl6zgoORZSBs1Acb:ixoMpjHbSGNgro1mWCQ6a3IzgoOrOoT
Static task
static1
Behavioral task
behavioral1
Sample
PI2009153.exe
Resource
win7-20240708-en
Malware Config
Extracted
xloader
2.1
8ah
outcrewz.com
superstormkleenup.com
onewildmermaid.com
awhvh.com
fundacionamoryesperanza.com
raisingabbi.com
peersonpurpose.com
brasilliana.com
bkkshutter68.com
revistaartesanato.net
machadiet.com
hurricanefloodcleaning.com
poshmargarita.life
skyhighet.com
letsgetrealyyc.com
wiringplusllc.com
news3105.pictures
huaxiangyan.com
telesecretariat-medical.com
imcc-j.com
jlsignaturemusic.com
rbdia.com
produsensarungmobil.com
mybfcu.com
citgo.energy
nathangivesback.com
trawli.com
thedivinemessengercourse.com
hrat.ltd
rgogr.com
marchwithmina.com
blakbakk.win
200579.top
coreymfisher.com
mytrado.info
stamfordmemoriesgateway.com
jaimemonentreprise.net
priapedia.com
stormharbourenergy.com
95664111.net
basictraxx.com
eliangwang.com
veterinariapichichus.com
kindergarden.info
kingofkingsco.com
ciphergain.com
414opebet.com
yizhijiemi.com
allstar.coupons
realestatephotobymila.com
995vpu.info
javierandchanteywedding.com
039manx.com
lowermypgebill.com
rt09gip.com
alexthatsme.com
numizmat-rnd.com
pursuingvanity.com
tytrbj.com
autismlocal.com
deliciousvillefoods.com
spliffbarcelona.com
vesevica.com
bxglz2.com
mage-cart.info
Targets
-
-
Target
PI2009153.exe
-
Size
435KB
-
MD5
2261b6b87980a9fe9d22499c32af581a
-
SHA1
ad538af5295f9b670f3bc23c6d4c3bf79d388572
-
SHA256
a6ec6fd1e4c0673bde9231a68752edca4fb9fda60e342cd735ff53729d262da8
-
SHA512
600416010f13514e3faa2fdda94df93ae89b6f964381ee02c1a9a982a6aaec2c823bb7235b57bee33ab5c8e07f89293c1ca988f9f772e5da207f3d8336fcbde9
-
SSDEEP
12288:aZ41MVuZj2uUPrxLfCl2/reQIh2+J6tzyvscuPbR:aZ9VUfCrxjCUeFh2+JWuvscER
-
Formbook family
-
Xloader family
-
Xloader payload
-
Adds policy Run key to start application
-
Deletes itself
-
Suspicious use of SetThreadContext
-