General

  • Target

    JaffaCakes118_f668e4c9cc8a691b159e2033f30f50b5

  • Size

    438KB

  • Sample

    250111-ejmdesvqfj

  • MD5

    f668e4c9cc8a691b159e2033f30f50b5

  • SHA1

    3ef37ae10df8f196b68f69db29a7f369fa181970

  • SHA256

    07826de5569163107133c374c0f4fde7f494118f127cce285a2a280d98b2dd3b

  • SHA512

    92cef7c693652fbd31f878b2f5a759c6bacfc07e479a64cf0ce8ddb9cf35468c4a0630eac572185b90b1fc7e7076e3b6f6859d1ad39c7da7d1fdffb8cf67d90d

  • SSDEEP

    6144:q6Uqd2GhN7lJShIwaV21Eh4YG0DHbFrmyw2J84np7w45uf4gErn0q:XUi2iNxJsbaU1E4wgywG8MBufpGnP

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

m6t2

Decoy

somethinghaatke.net

bluehubwriters.com

ptfitnet.com

coastelevatorinteriors.com

hellensilvamkd.com

feekyfeeky.com

studioemiko.com

high-clicks2.com

troyleedesigns.club

peopletrucksinsurance.com

lameducation.com

pundiajaib.com

photosonunderwear.com

hautegirlmarket.com

groopadamce.quest

ignitivehq.com

partyprintable.digital

unlimitedrehab.com

awaytraveltnpasumo6.xyz

hourly.limo

Targets

    • Target

      JaffaCakes118_f668e4c9cc8a691b159e2033f30f50b5

    • Size

      438KB

    • MD5

      f668e4c9cc8a691b159e2033f30f50b5

    • SHA1

      3ef37ae10df8f196b68f69db29a7f369fa181970

    • SHA256

      07826de5569163107133c374c0f4fde7f494118f127cce285a2a280d98b2dd3b

    • SHA512

      92cef7c693652fbd31f878b2f5a759c6bacfc07e479a64cf0ce8ddb9cf35468c4a0630eac572185b90b1fc7e7076e3b6f6859d1ad39c7da7d1fdffb8cf67d90d

    • SSDEEP

      6144:q6Uqd2GhN7lJShIwaV21Eh4YG0DHbFrmyw2J84np7w45uf4gErn0q:XUi2iNxJsbaU1E4wgywG8MBufpGnP

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks