General
-
Target
lMXRjgD.bin
-
Size
473KB
-
Sample
201109-alhaecbssn
-
MD5
39985f475ec661784108d36cb08009a2
-
SHA1
0a9a6452579c16e60b3bb6d0ef019e9b1531e72d
-
SHA256
8dbbc783a02a103f860b387d4c62c278b47c234e5ad4331eda1ba6ed7b06194f
-
SHA512
a92ae92382e92a3c86b375c6338421f6c93ad49143c602cb727ada8f4a8a7c4461e0d3bdfa56099f19c6f452275d1fe4d18ef61f51fba9ff7749d7711086c80d
Static task
static1
Behavioral task
behavioral1
Sample
lMXRjgD.bin.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
lMXRjgD.bin.dll
Resource
win10v20201028
Malware Config
Extracted
zloader
bot5
bot5
https://militanttra.at/owg.php
Targets
-
-
Target
lMXRjgD.bin
-
Size
473KB
-
MD5
39985f475ec661784108d36cb08009a2
-
SHA1
0a9a6452579c16e60b3bb6d0ef019e9b1531e72d
-
SHA256
8dbbc783a02a103f860b387d4c62c278b47c234e5ad4331eda1ba6ed7b06194f
-
SHA512
a92ae92382e92a3c86b375c6338421f6c93ad49143c602cb727ada8f4a8a7c4461e0d3bdfa56099f19c6f452275d1fe4d18ef61f51fba9ff7749d7711086c80d
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-