General
-
Target
202.dll
-
Size
387KB
-
Sample
200720-5x3nxkcx7j
-
MD5
d807f97e41c73e54984ebe5a5228be7a
-
SHA1
3ee769477a72b6dbc39cfed759e6f58d16a96151
-
SHA256
4fb5e1b5eaa6a8f4ff3e80429adaa9f5af1dded814c724a7839f25636530d0e3
-
SHA512
36f1fd0b2d7efde2cbd2a76f2986517b3f1917fe3882f5eaf42cc1ac7087370969f6c2627b2662bc1a73f705c57d8a15a093a26a12ec9e479f693a58c46f6d81
Static task
static1
Behavioral task
behavioral1
Sample
202.dll
Resource
win7
Behavioral task
behavioral2
Sample
202.dll
Resource
win10v200430
Malware Config
Extracted
zloader
DLLobnova
dllnewheh
https://dsdjfhdsufudhjas.name/gate.php
https://dsdjfhd9ddksaas.com/gate.php
https://dsdjfhdsufudhjas.pw/gate.php
https://dsdjfhd9ddksaas.ru/gate.php
https://dsdjfhdsufudhjas.su/gate.php
https://kdsadisadijdsasm2.com/gate.php
https://dsdjfhdsufudhjas.net/gate.php
https://dsdjfhd9ddksaas.eu/gate.php
03d5ae30a0bd934a23b6a7f0756aa504
Targets
-
-
Target
202.dll
-
Size
387KB
-
MD5
d807f97e41c73e54984ebe5a5228be7a
-
SHA1
3ee769477a72b6dbc39cfed759e6f58d16a96151
-
SHA256
4fb5e1b5eaa6a8f4ff3e80429adaa9f5af1dded814c724a7839f25636530d0e3
-
SHA512
36f1fd0b2d7efde2cbd2a76f2986517b3f1917fe3882f5eaf42cc1ac7087370969f6c2627b2662bc1a73f705c57d8a15a093a26a12ec9e479f693a58c46f6d81
Score10/10-
Blacklisted process makes network request
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Modifies service
-
Suspicious use of SetThreadContext
-