General

  • Target

    zte.dll

  • Size

    473KB

  • Sample

    201109-31fgec9e6e

  • MD5

    00cc931e3c4ce21eaed78d8ee7352c35

  • SHA1

    ee66e9cb16520de48a1efe4e09368067d9ee1a78

  • SHA256

    98a58a4f1a0b1305c473eeafa6dac80c2e2edd7e8aa8fe6d32ccac81318de1e5

  • SHA512

    1ba56fe37631544d8c0238183bf04aed3ffad09999183fef18bb84493502cfc7a3c4109f03062e0ef5b31f00a923e9b8e01eac1e788e52d66b074c2f8f5a16cb

Malware Config

Extracted

Family

zloader

Botnet

bot5

Campaign

bot5

C2

https://militanttra.at/owg.php

rc4.plain
rsa_pubkey.plain

Targets

    • Target

      zte.dll

    • Size

      473KB

    • MD5

      00cc931e3c4ce21eaed78d8ee7352c35

    • SHA1

      ee66e9cb16520de48a1efe4e09368067d9ee1a78

    • SHA256

      98a58a4f1a0b1305c473eeafa6dac80c2e2edd7e8aa8fe6d32ccac81318de1e5

    • SHA512

      1ba56fe37631544d8c0238183bf04aed3ffad09999183fef18bb84493502cfc7a3c4109f03062e0ef5b31f00a923e9b8e01eac1e788e52d66b074c2f8f5a16cb

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks