General

  • Target

    Statement 12-01-2021.com

  • Size

    552KB

  • Sample

    211201-hm3rcsdfb9

  • MD5

    d84165c69252af24ac6a92da452b4eb2

  • SHA1

    5ca05c20d6240e1ab18c4204cfe3a8d85b5fede4

  • SHA256

    99e122686461defed546b28e1b3461a92cc5a3e0fe46cac917f5e130d5941f1f

  • SHA512

    ada97e517e7678ad971c73395d282d84c1b35493f7cd012ac226a08549757ec756d147ccc404620cd655804c24d1ed5f8e68390478fc3a5b6f134d326c78b3f5

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

unzn

C2

http://www.davanamays.com/unzn/

Decoy

xiulf.com

highcountrymortar.com

523561.com

marketingagency.tools

ganmovie.net

nationaalcontactpunt.com

sirrbter.com

begizas.xyz

missimi-fashion.com

munixc.info

daas.support

spaceworbc.com

faithtruthresolve.com

gymkub.com

thegrayverse.xyz

artisanmakefurniture.com

029tryy.com

ijuubx.biz

iphone13promax.club

techuniversus.com

Targets

    • Target

      Statement 12-01-2021.com

    • Size

      552KB

    • MD5

      d84165c69252af24ac6a92da452b4eb2

    • SHA1

      5ca05c20d6240e1ab18c4204cfe3a8d85b5fede4

    • SHA256

      99e122686461defed546b28e1b3461a92cc5a3e0fe46cac917f5e130d5941f1f

    • SHA512

      ada97e517e7678ad971c73395d282d84c1b35493f7cd012ac226a08549757ec756d147ccc404620cd655804c24d1ed5f8e68390478fc3a5b6f134d326c78b3f5

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Discovery

System Information Discovery

2
T1082

Tasks