General

  • Target

    lMXRjgD.bin

  • Size

    473KB

  • Sample

    201109-alhaecbssn

  • MD5

    39985f475ec661784108d36cb08009a2

  • SHA1

    0a9a6452579c16e60b3bb6d0ef019e9b1531e72d

  • SHA256

    8dbbc783a02a103f860b387d4c62c278b47c234e5ad4331eda1ba6ed7b06194f

  • SHA512

    a92ae92382e92a3c86b375c6338421f6c93ad49143c602cb727ada8f4a8a7c4461e0d3bdfa56099f19c6f452275d1fe4d18ef61f51fba9ff7749d7711086c80d

Malware Config

Extracted

Family

zloader

Botnet

bot5

Campaign

bot5

C2

https://militanttra.at/owg.php

rc4.plain
rsa_pubkey.plain

Targets

    • Target

      lMXRjgD.bin

    • Size

      473KB

    • MD5

      39985f475ec661784108d36cb08009a2

    • SHA1

      0a9a6452579c16e60b3bb6d0ef019e9b1531e72d

    • SHA256

      8dbbc783a02a103f860b387d4c62c278b47c234e5ad4331eda1ba6ed7b06194f

    • SHA512

      a92ae92382e92a3c86b375c6338421f6c93ad49143c602cb727ada8f4a8a7c4461e0d3bdfa56099f19c6f452275d1fe4d18ef61f51fba9ff7749d7711086c80d

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks