Analysis
-
max time kernel
69s -
max time network
140s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
01-11-2020 12:40
Static task
static1
Behavioral task
behavioral1
Sample
order_00588_pay.rar.exe
Resource
win7v20201028
General
-
Target
order_00588_pay.rar.exe
-
Size
292KB
-
MD5
75d2fed737e66dd5f524043bd0e99b55
-
SHA1
3930debcaa8745b5a66f55bae9190423b5313fbd
-
SHA256
d73871ac75496c6892613fbcda7bb4ad9f3bc868a134933b640699f8d8da53ca
-
SHA512
f72ba481ddb4a2469abbe7e313a6b5d6ab28fbe5bd1c150b9b3c2137d0a4fb69154dcb854e0a834628cbefd29d75a18e491a7ee4df145567232bc8ea7fec18c3
Malware Config
Extracted
zloader
r1
r1
https://notsweets.net/LKhwojehDgwegSDG/gateJKjdsh.php
https://olpons.com/LKhwojehDgwegSDG/gateJKjdsh.php
https://karamelliar.org/LKhwojehDgwegSDG/gateJKjdsh.php
https://dogrunn.com/LKhwojehDgwegSDG/gateJKjdsh.php
https://azoraz.net/LKhwojehDgwegSDG/gateJKjdsh.php
Signatures
Processes
-
C:\Users\Admin\AppData\Local\Temp\order_00588_pay.rar.exe"C:\Users\Admin\AppData\Local\Temp\order_00588_pay.rar.exe"
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
Downloads
-
memory/4232-2-0x0000000000150000-0x0000000000178000-memory.dmpFilesize
160KB
-
memory/4232-3-0x0000000000000000-mapping.dmp
-
memory/4696-0-0x00000000024B4000-0x00000000024B5000-memory.dmpFilesize
4KB
-
memory/4696-1-0x0000000004140000-0x0000000004141000-memory.dmpFilesize
4KB