General

  • Target

    dok.dll

  • Size

    489KB

  • Sample

    201109-bcpfn6lyze

  • MD5

    555b6f428755250c3f9e031829f7b1db

  • SHA1

    e6c85e51373e67cc8f89465ebc564de80084a3a2

  • SHA256

    ff1ff76de533d2a904dea68e2c7b27d9f346a2bddedd3ab12a9181f6dbba55b2

  • SHA512

    bb1753d6473ebc9091d328ffc363dd6666741c31f784273223ed498a6f4ae471558b6ac4f9aec89da2356afa7cd49326ccbc4fcdf466fd6efbcdd82388810474

Malware Config

Extracted

Family

zloader

Botnet

bot5

Campaign

bot5

C2

https://militanttra.at/owg.php

rc4.plain
rsa_pubkey.plain

Targets

    • Target

      dok.dll

    • Size

      489KB

    • MD5

      555b6f428755250c3f9e031829f7b1db

    • SHA1

      e6c85e51373e67cc8f89465ebc564de80084a3a2

    • SHA256

      ff1ff76de533d2a904dea68e2c7b27d9f346a2bddedd3ab12a9181f6dbba55b2

    • SHA512

      bb1753d6473ebc9091d328ffc363dd6666741c31f784273223ed498a6f4ae471558b6ac4f9aec89da2356afa7cd49326ccbc4fcdf466fd6efbcdd82388810474

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks