General

  • Target

    JaffaCakes118_129f508d53cfffabad90273bd81fe944

  • Size

    490KB

  • Sample

    250106-gtxm9a1jbr

  • MD5

    129f508d53cfffabad90273bd81fe944

  • SHA1

    6bdc258e300a42bcb84dc07db789ec1ff5469bc7

  • SHA256

    6c30a892d816d8bd1dff82f0f32629e995222ef64abe420c34e9ba74cde5765f

  • SHA512

    76d11f458a8a533e1caa5687435559feecc378a1fb933d418f2ebfeee932239053d2e8d4b515dba4f30595704d1771ba509f26d8caf0424684a3c807daa49154

  • SSDEEP

    6144:1GxhLwIa+v2TgTxWyYZW2uPxJgpjt61mAKc4WzJCZNozJztm:0ftwgTx2W2upJgVmBKuzggtm

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

n8cr

Decoy

mainponsel.com

twdesignacreation.com

obsidianfields.net

biologik.education

australianmeatandwine.com

metaverse360.biz

tenlog034.xyz

retryb.com

darbodrum.com

ouranos.xyz

equityreleaseshelpukweb.com

buck100.com

cfip-plongee.com

sundindustrial.com

godigitalwithpavitra.com

exodiguis.com

ncxogt.com

medyncity.store

bseafacepharma.online

dellmoor.com

Targets

    • Target

      JaffaCakes118_129f508d53cfffabad90273bd81fe944

    • Size

      490KB

    • MD5

      129f508d53cfffabad90273bd81fe944

    • SHA1

      6bdc258e300a42bcb84dc07db789ec1ff5469bc7

    • SHA256

      6c30a892d816d8bd1dff82f0f32629e995222ef64abe420c34e9ba74cde5765f

    • SHA512

      76d11f458a8a533e1caa5687435559feecc378a1fb933d418f2ebfeee932239053d2e8d4b515dba4f30595704d1771ba509f26d8caf0424684a3c807daa49154

    • SSDEEP

      6144:1GxhLwIa+v2TgTxWyYZW2uPxJgpjt61mAKc4WzJCZNozJztm:0ftwgTx2W2upJgVmBKuzggtm

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks