General

  • Target

    JaffaCakes118_a0992ed732b9ff9ede1ea7110b093d56

  • Size

    430KB

  • Sample

    250105-nf9tzsvlhn

  • MD5

    a0992ed732b9ff9ede1ea7110b093d56

  • SHA1

    9620fe7daaab3861287330e311c220954545b1ef

  • SHA256

    121f61ebfff0c27ee2a9df12e2d27e1908c8b895b7c80083be925498216d4c47

  • SHA512

    155f9cf2b1b2de1435a271e317497302779aaccd1ef1a836c1b61c231435f53f27f0ff4500fa84d40234ac97bef9d5a63cfc756a79dd0cb1f6226bf561e4da85

  • SSDEEP

    12288:fUi2iNuLhSgbttjwyXUXdJqKj2TMO/Sd++UD:fUi1kSgnwyX2dJqK2iDUD

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

fqiq

Decoy

driventow.com

ipatchwork.today

bolder.equipment

seal-brother.com

mountlaketerraceapartments.com

weeden.xyz

sanlifalan.com

athafood.com

isshinn1.com

creationslazzaroni.com

eclecticrenaissancewoman.com

satellitephonstore.com

cotchildcare.com

yamacorp.digital

ff4cuno43.xyz

quicksticks.community

govindfinance.com

farmersfirstseed.com

megacinema.club

tablescaperendezvous4two.com

Targets

    • Target

      JaffaCakes118_a0992ed732b9ff9ede1ea7110b093d56

    • Size

      430KB

    • MD5

      a0992ed732b9ff9ede1ea7110b093d56

    • SHA1

      9620fe7daaab3861287330e311c220954545b1ef

    • SHA256

      121f61ebfff0c27ee2a9df12e2d27e1908c8b895b7c80083be925498216d4c47

    • SHA512

      155f9cf2b1b2de1435a271e317497302779aaccd1ef1a836c1b61c231435f53f27f0ff4500fa84d40234ac97bef9d5a63cfc756a79dd0cb1f6226bf561e4da85

    • SSDEEP

      12288:fUi2iNuLhSgbttjwyXUXdJqKj2TMO/Sd++UD:fUi1kSgnwyX2dJqK2iDUD

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks