General
-
Target
july22.dll
-
Size
395KB
-
Sample
200725-jw6c5c3brx
-
MD5
94fa4ef5c63b688a2813e95138198cb4
-
SHA1
24695fee9af688864a789b0415c19918870fdff5
-
SHA256
c1532b3d37ff2ec7d70d7f8037b8cdf843d3cdd24adf860f4251d045ddf9d47c
-
SHA512
e3d83795765e9e1f6c87f33494894260956b86fc7d8455c7ac0eb23c3f4d9c227c6e0358745eba7a87e9ff367d9a19adc257c75c59278d0f968f94eb408bf85c
Static task
static1
Behavioral task
behavioral1
Sample
july22.dll
Resource
win7
Malware Config
Extracted
zloader
July20SSL
July20SSL
https://vlcafxbdjtlvlcduwhga.com/web/post.php
https://softwareserviceupdater3.com/web/post.php
https://softwareserviceupdater4.com/web/post.php
2b4@jfhu#sd43fd!42d
Targets
-
-
Target
july22.dll
-
Size
395KB
-
MD5
94fa4ef5c63b688a2813e95138198cb4
-
SHA1
24695fee9af688864a789b0415c19918870fdff5
-
SHA256
c1532b3d37ff2ec7d70d7f8037b8cdf843d3cdd24adf860f4251d045ddf9d47c
-
SHA512
e3d83795765e9e1f6c87f33494894260956b86fc7d8455c7ac0eb23c3f4d9c227c6e0358745eba7a87e9ff367d9a19adc257c75c59278d0f968f94eb408bf85c
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blacklisted process makes network request
-
Suspicious use of SetThreadContext
-