General

  • Target

    JaffaCakes118_516d474f082a4b5278d13dbf8547d2b7

  • Size

    493KB

  • Sample

    250107-gn4jlsxmdz

  • MD5

    516d474f082a4b5278d13dbf8547d2b7

  • SHA1

    1afddf79556b44091fffe8bcaefcf7945ad17a5e

  • SHA256

    6acd5c9d1f204fc1af1d3e8a67578b3b2c6b58a76346b09efe2dd56a50c78d1b

  • SHA512

    c7d79c0806e9b0caae453230e3a82a8dfe16ed62017f828f913fbff6b7cfbf5739fd911673f87315beb515af1a01ce6c8711023c1bba5d359144bcf48361e06a

  • SSDEEP

    6144:XGxhLpLFI/3v1SE8CBcXVBdXlXx6lVo57lkkdIl+M8HoS:2ZiXpzcXVBdVBWo5xHhMso

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

fi6a

Decoy

shoeloans.com

paulsamaco.com

sustalnablels.com

talinwauchope.com

siniwali.com

mindblowingupdates.com

recbi56ni.com

agusdaud.com

api-28nnys.com

lrfinancialservices.net

toom.website

5555wns.com

macfolie.store

1866donaldwins.com

odontoelearning.com

61vr.com

moragaat.tech

ickejo.quest

kipkleen.online

bompshebomp.com

Targets

    • Target

      JaffaCakes118_516d474f082a4b5278d13dbf8547d2b7

    • Size

      493KB

    • MD5

      516d474f082a4b5278d13dbf8547d2b7

    • SHA1

      1afddf79556b44091fffe8bcaefcf7945ad17a5e

    • SHA256

      6acd5c9d1f204fc1af1d3e8a67578b3b2c6b58a76346b09efe2dd56a50c78d1b

    • SHA512

      c7d79c0806e9b0caae453230e3a82a8dfe16ed62017f828f913fbff6b7cfbf5739fd911673f87315beb515af1a01ce6c8711023c1bba5d359144bcf48361e06a

    • SSDEEP

      6144:XGxhLpLFI/3v1SE8CBcXVBdXlXx6lVo57lkkdIl+M8HoS:2ZiXpzcXVBdVBWo5xHhMso

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks