Resubmissions

10-09-2024 16:21

240910-ttserasepr 10

28-07-2020 23:07

200728-dgaye9ycja 10

General

  • Target

    cYNhXOc.dll

  • Size

    508KB

  • Sample

    200728-dgaye9ycja

  • MD5

    7bebb1b85a609733df0b3205406723bb

  • SHA1

    384f07648c732cd9490b7d3bff41ce5a0911b138

  • SHA256

    02846dbf25b333625a0720075fb47da62a946e5b0b4f9e9ba14cef514d576b37

  • SHA512

    4147af9ed60d340218deb382374a015a3bb4cc4abc585e833e1a81ba21bf05f485e2a4cfc7b99223e9015ccda993c5ff19693ce7c00fb18701e66cd259422865

Malware Config

Extracted

Family

zloader

Botnet

july28

Campaign

july28

C2

https://vlcafxbdjtlvlcduwhga.com/web/post.php

https://softwareserviceupdater3.com/web/post.php

https://softwareserviceupdater4.com/web/post.php

2b4@jfhu#sd43fd!42d

rc4.plain

Targets

    • Target

      cYNhXOc.dll

    • Size

      508KB

    • MD5

      7bebb1b85a609733df0b3205406723bb

    • SHA1

      384f07648c732cd9490b7d3bff41ce5a0911b138

    • SHA256

      02846dbf25b333625a0720075fb47da62a946e5b0b4f9e9ba14cef514d576b37

    • SHA512

      4147af9ed60d340218deb382374a015a3bb4cc4abc585e833e1a81ba21bf05f485e2a4cfc7b99223e9015ccda993c5ff19693ce7c00fb18701e66cd259422865

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Blacklisted process makes network request

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Modifies service

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks