General

  • Target

    zte.dll

  • Size

    473KB

  • Sample

    201109-c4ajw42bsn

  • MD5

    6ee5f47935a9791e16bfab62e9ae3f46

  • SHA1

    4c7d59a2e85623d6506a738fe456936afc460746

  • SHA256

    244bd22b299305418f66c5a6239c70bdc5eced7c0464210feaac591301241cd5

  • SHA512

    49697b61f9b56de7be35eddd72f6fd005453249f1122a7ea1f26d91afa1fb7ae0e30bfb1523ae018636b6cce3e36c847073e69d95082bc3d54fde201f0bca003

Malware Config

Extracted

Family

zloader

Botnet

bot5

Campaign

bot5

C2

https://militanttra.at/owg.php

rc4.plain
rsa_pubkey.plain

Targets

    • Target

      zte.dll

    • Size

      473KB

    • MD5

      6ee5f47935a9791e16bfab62e9ae3f46

    • SHA1

      4c7d59a2e85623d6506a738fe456936afc460746

    • SHA256

      244bd22b299305418f66c5a6239c70bdc5eced7c0464210feaac591301241cd5

    • SHA512

      49697b61f9b56de7be35eddd72f6fd005453249f1122a7ea1f26d91afa1fb7ae0e30bfb1523ae018636b6cce3e36c847073e69d95082bc3d54fde201f0bca003

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks