General

  • Target

    JaffaCakes118_9f9573edc4ca67d4e0326655c1d815a1

  • Size

    438KB

  • Sample

    250108-psslxazmcy

  • MD5

    9f9573edc4ca67d4e0326655c1d815a1

  • SHA1

    0972f9e359b159988051da7d8aeac350f63b249c

  • SHA256

    6a522008c89ced7e3f287ed4c24733985b1c9e8cb358c0b86d4069a3196c095b

  • SHA512

    bbc4aa4e86513825df36cfef53672bc0cc69dc0b7f8dbba7ec579a3d876af646339914f37f03c1c85db40cbce8021919b9ee06fd96195fdd4d0f889383df3b43

  • SSDEEP

    12288:SdeLnIVvjGGAFviNzSkyDK1gqVW9qMX4s:PsVgOzQ+W9qK4s

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

riho

Decoy

surfcitydawg.com

pwuq9t.com

prefectfxtrader.com

369xy.com

bjhygj888.com

cabinetfuid.com

houstondynamics.net

bertiebots.com

taboohospitality.com

fearlessthread.com

loropiana-store.online

growthventuresinc.net

artairazur.xyz

tvframesdisply.com

flammifer.biz

gtnetpro.com

b3sportaintment.com

housing-staff.net

superdelicioso.com

14mpt.xyz

Targets

    • Target

      JaffaCakes118_9f9573edc4ca67d4e0326655c1d815a1

    • Size

      438KB

    • MD5

      9f9573edc4ca67d4e0326655c1d815a1

    • SHA1

      0972f9e359b159988051da7d8aeac350f63b249c

    • SHA256

      6a522008c89ced7e3f287ed4c24733985b1c9e8cb358c0b86d4069a3196c095b

    • SHA512

      bbc4aa4e86513825df36cfef53672bc0cc69dc0b7f8dbba7ec579a3d876af646339914f37f03c1c85db40cbce8021919b9ee06fd96195fdd4d0f889383df3b43

    • SSDEEP

      12288:SdeLnIVvjGGAFviNzSkyDK1gqVW9qMX4s:PsVgOzQ+W9qK4s

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks