General

  • Target

    JaffaCakes118_65742020a34915e204448afb33bd0e2e

  • Size

    401KB

  • Sample

    250102-qsqb8awpar

  • MD5

    65742020a34915e204448afb33bd0e2e

  • SHA1

    c21c726683fe4469870de2696eec8b824cef965c

  • SHA256

    e25be2c8b81539da9105c5bb4243ed37a8ded3cd6a1d15e2afec79418ebcfe85

  • SHA512

    b95bdea2f744b15c9e27a55c8e3124af94b8d6f51aa08767b39ba47f323fd3c8bb25e5eb9bfd14e2c48d4d2870ff9aff2cdb2a46bf58eb5b880699243c22b982

  • SSDEEP

    6144:6NPTWnndzk2VJuoEESdgruWAXvP/s81Khr2bCn6qkxuKY:6ZWnnR7JuoEES6aWA/Ihqboz

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

yjqn

Decoy

ittybittybunnies.com

flordedesierto.com

cum.care

petshomespace.com

verputzarbeit.com

yuvajanmat.com

getlie.com

finanes.xyz

thelazyrando.com

domelite.design

yukinko-takasu.com

pontosmensal.com

maurlinoconstruction.com

getelectronow.com

newmexicocarwrecklawfirm.com

gunnbucks.com

ncsy30.xyz

opsem.info

authorisewallet.com

scchanghe.com

Targets

    • Target

      JaffaCakes118_65742020a34915e204448afb33bd0e2e

    • Size

      401KB

    • MD5

      65742020a34915e204448afb33bd0e2e

    • SHA1

      c21c726683fe4469870de2696eec8b824cef965c

    • SHA256

      e25be2c8b81539da9105c5bb4243ed37a8ded3cd6a1d15e2afec79418ebcfe85

    • SHA512

      b95bdea2f744b15c9e27a55c8e3124af94b8d6f51aa08767b39ba47f323fd3c8bb25e5eb9bfd14e2c48d4d2870ff9aff2cdb2a46bf58eb5b880699243c22b982

    • SSDEEP

      6144:6NPTWnndzk2VJuoEESdgruWAXvP/s81Khr2bCn6qkxuKY:6ZWnnR7JuoEES6aWA/Ihqboz

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks