General

  • Target

    JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4

  • Size

    488KB

  • Sample

    250106-jf6ecazqfz

  • MD5

    16bd0c34e0f9a72a202bf8458e82eab4

  • SHA1

    ca156b29a324d887bd5f68c9c7f5b24be3416a7f

  • SHA256

    166e7b6c56c006f7336a286a7bff9844f25acb7d404b982afd32b83c885fa5fd

  • SHA512

    b1621b37f3ed08c37be0f4ce336952c7f59997f2c52ffe4d51c7c17f4aab4b1af18f489d8361adbc0bff782bfd6e1d23956cd34cb9a6cf9419da08f07f038bb5

  • SSDEEP

    6144:fGxhLyIr1v4d+jN9YmW/RFHXR6kHKqiWtQLnY2/h/SSs38RYFK9mKfHA:OdVu+jNyV/jHXskHKqQYuh/28RYFKl

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

mc6b

Decoy

packyssportsbarandgrill.com

catherinemata.com

swooningheartsenterprises.com

miss-notary86.com

applianceson.website

investormonks.online

lootproject.art

adoletakids.com

searchlink7.com

msjoyjewelsunlimited.com

dannisdolls.online

premierpor.xyz

geceseks.com

camdaw.xyz

ditrixmed.store

yotosunny.com

asdeformar.com

lacofood.com

nu865ci.com

verdantgomkte.xyz

Targets

    • Target

      JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4

    • Size

      488KB

    • MD5

      16bd0c34e0f9a72a202bf8458e82eab4

    • SHA1

      ca156b29a324d887bd5f68c9c7f5b24be3416a7f

    • SHA256

      166e7b6c56c006f7336a286a7bff9844f25acb7d404b982afd32b83c885fa5fd

    • SHA512

      b1621b37f3ed08c37be0f4ce336952c7f59997f2c52ffe4d51c7c17f4aab4b1af18f489d8361adbc0bff782bfd6e1d23956cd34cb9a6cf9419da08f07f038bb5

    • SSDEEP

      6144:fGxhLyIr1v4d+jN9YmW/RFHXR6kHKqiWtQLnY2/h/SSs38RYFK9mKfHA:OdVu+jNyV/jHXskHKqQYuh/28RYFKl

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks