Resubmissions

15-11-2023 13:29

231115-qrppascc7z 10

25-07-2020 00:15

200725-jw6c5c3brx 10

General

  • Target

    july22.dll

  • Size

    395KB

  • Sample

    200725-jw6c5c3brx

  • MD5

    94fa4ef5c63b688a2813e95138198cb4

  • SHA1

    24695fee9af688864a789b0415c19918870fdff5

  • SHA256

    c1532b3d37ff2ec7d70d7f8037b8cdf843d3cdd24adf860f4251d045ddf9d47c

  • SHA512

    e3d83795765e9e1f6c87f33494894260956b86fc7d8455c7ac0eb23c3f4d9c227c6e0358745eba7a87e9ff367d9a19adc257c75c59278d0f968f94eb408bf85c

Malware Config

Extracted

Family

zloader

Botnet

July20SSL

Campaign

July20SSL

C2

https://vlcafxbdjtlvlcduwhga.com/web/post.php

https://softwareserviceupdater3.com/web/post.php

https://softwareserviceupdater4.com/web/post.php

2b4@jfhu#sd43fd!42d

rc4.plain

Targets

    • Target

      july22.dll

    • Size

      395KB

    • MD5

      94fa4ef5c63b688a2813e95138198cb4

    • SHA1

      24695fee9af688864a789b0415c19918870fdff5

    • SHA256

      c1532b3d37ff2ec7d70d7f8037b8cdf843d3cdd24adf860f4251d045ddf9d47c

    • SHA512

      e3d83795765e9e1f6c87f33494894260956b86fc7d8455c7ac0eb23c3f4d9c227c6e0358745eba7a87e9ff367d9a19adc257c75c59278d0f968f94eb408bf85c

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Blacklisted process makes network request

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks