General

  • Target

    JaffaCakes118_23184c611c38fc659dc5f58481077997

  • Size

    1.5MB

  • Sample

    250106-pflb3awmby

  • MD5

    23184c611c38fc659dc5f58481077997

  • SHA1

    04ad1f40d63a948b76ad9da3b4556df5db0687b3

  • SHA256

    dbaf595b729a5fbd682a2da922d9fea0b34f0126c4a11c96392b51eee8462220

  • SHA512

    364e35f3f90b7b54c8abc127565c701130f68710b03c32f4d06eb9f768652faf358f8bdc7de95f0963a0e902d9975007ee36d7d717f543bf9aad6f1da77701a1

  • SSDEEP

    24576:gPvGhlToPK/vx6WEHyQG87Ik/3Km8GUlVLdAKLGIQHgqs67bfAWeW:gnWBnxSHy8Ew61lVLdnLGI0j1BeW

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

fpdi

Decoy

jencio.com

b9jty7.com

banahinvestments.com

capitolfurniture.net

jlvip1086.com

pompeyocargo.com

designbyshubhi.info

elbauldepecas.com

bracelexx.online

advanceporbrx.xyz

ruihongco.com

wipemirecord.com

goodfoodsme.com

sommpick.com

rangilugujarat.com

realestate5g.com

spunkdlashes.com

palisadestahoehousing.com

brandingsocal.com

privatejetsboston.com

Targets

    • Target

      JaffaCakes118_23184c611c38fc659dc5f58481077997

    • Size

      1.5MB

    • MD5

      23184c611c38fc659dc5f58481077997

    • SHA1

      04ad1f40d63a948b76ad9da3b4556df5db0687b3

    • SHA256

      dbaf595b729a5fbd682a2da922d9fea0b34f0126c4a11c96392b51eee8462220

    • SHA512

      364e35f3f90b7b54c8abc127565c701130f68710b03c32f4d06eb9f768652faf358f8bdc7de95f0963a0e902d9975007ee36d7d717f543bf9aad6f1da77701a1

    • SSDEEP

      24576:gPvGhlToPK/vx6WEHyQG87Ik/3Km8GUlVLdAKLGIQHgqs67bfAWeW:gnWBnxSHy8Ew61lVLdnLGI0j1BeW

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks