General

  • Target

    JaffaCakes118_2c2811633faebf78e7bdefb5e8867faf

  • Size

    337KB

  • Sample

    250106-s7jjbssner

  • MD5

    2c2811633faebf78e7bdefb5e8867faf

  • SHA1

    c5b01b1cbfc32b1470eacce7ff54d042e18b3e98

  • SHA256

    0c9257ae6c84763746b188ff4d2dc58d040b32f8ab54e9466137312c8e0cc92b

  • SHA512

    38b32de4d05dde95f97f8e3ec28c7e394f16f1417d09ddfef9a2ce05547804c82e3677a33b8c44addaa0d53fc1feee186cfc3e58671ce0c938af626c2a8f7d5e

  • SSDEEP

    6144:WfDetGGYMkhBA1pCyFam6afSPJ3tusE3yTgGqU8VozKCBfc5fTCm+xzqAq:WfCthzSBWCsamnfSB3tZEEx8VaKCBojv

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ef6c

Decoy

gicaredocs.com

govusergroup.com

conversationspit.com

brondairy.com

rjtherealest.com

xn--9m1bq8wgkag3rjvb.com

mylori.net

softandcute.store

ahljsm.com

shacksolid.com

weekendmusecollection.com

gaminghallarna.net

pgonline111.online

44mpt.xyz

ambrandt.com

eddytattoo.com

blendeqes.com

upinmyfeels.com

lacucinadesign.com

docomoau.xyz

Targets

    • Target

      JaffaCakes118_2c2811633faebf78e7bdefb5e8867faf

    • Size

      337KB

    • MD5

      2c2811633faebf78e7bdefb5e8867faf

    • SHA1

      c5b01b1cbfc32b1470eacce7ff54d042e18b3e98

    • SHA256

      0c9257ae6c84763746b188ff4d2dc58d040b32f8ab54e9466137312c8e0cc92b

    • SHA512

      38b32de4d05dde95f97f8e3ec28c7e394f16f1417d09ddfef9a2ce05547804c82e3677a33b8c44addaa0d53fc1feee186cfc3e58671ce0c938af626c2a8f7d5e

    • SSDEEP

      6144:WfDetGGYMkhBA1pCyFam6afSPJ3tusE3yTgGqU8VozKCBfc5fTCm+xzqAq:WfCthzSBWCsamnfSB3tZEEx8VaKCBojv

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks