General
-
Target
zloader 2_1.0.6.0.vir
-
Size
141KB
-
Sample
200719-j3qdf4g92x
-
MD5
a74a0a84a2ed0674e540ac9aa4405638
-
SHA1
6ea4c0b33b660908b6032252c345c1936364390e
-
SHA256
58afcdc59220bd54561c650d1c9f1ebed87e517dc747dfc7d243bd19708b7222
-
SHA512
a7dc0515208a02ebaec31b39c74bcf366ea2deaac7f7bbbe2b748273c53868144dec8e129f909a8b5d46c0598db384581977f51a42b2b19fb1da15d62699262c
Static task
static1
Behavioral task
behavioral1
Sample
zloader 2_1.0.6.0.vir.exe
Resource
win7
Behavioral task
behavioral2
Sample
zloader 2_1.0.6.0.vir.exe
Resource
win10
Malware Config
Extracted
zloader
-test2
web7-test2
https://45.72.3.132/web7643/gate.php
Targets
-
-
Target
zloader 2_1.0.6.0.vir
-
Size
141KB
-
MD5
a74a0a84a2ed0674e540ac9aa4405638
-
SHA1
6ea4c0b33b660908b6032252c345c1936364390e
-
SHA256
58afcdc59220bd54561c650d1c9f1ebed87e517dc747dfc7d243bd19708b7222
-
SHA512
a7dc0515208a02ebaec31b39c74bcf366ea2deaac7f7bbbe2b748273c53868144dec8e129f909a8b5d46c0598db384581977f51a42b2b19fb1da15d62699262c
Score10/10-
Blacklisted process makes network request
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-