General
-
Target
zte.dll
-
Size
473KB
-
Sample
201109-c4ajw42bsn
-
MD5
6ee5f47935a9791e16bfab62e9ae3f46
-
SHA1
4c7d59a2e85623d6506a738fe456936afc460746
-
SHA256
244bd22b299305418f66c5a6239c70bdc5eced7c0464210feaac591301241cd5
-
SHA512
49697b61f9b56de7be35eddd72f6fd005453249f1122a7ea1f26d91afa1fb7ae0e30bfb1523ae018636b6cce3e36c847073e69d95082bc3d54fde201f0bca003
Static task
static1
Behavioral task
behavioral1
Sample
zte.dll
Resource
win7v20201028
Malware Config
Extracted
zloader
bot5
bot5
https://militanttra.at/owg.php
Targets
-
-
Target
zte.dll
-
Size
473KB
-
MD5
6ee5f47935a9791e16bfab62e9ae3f46
-
SHA1
4c7d59a2e85623d6506a738fe456936afc460746
-
SHA256
244bd22b299305418f66c5a6239c70bdc5eced7c0464210feaac591301241cd5
-
SHA512
49697b61f9b56de7be35eddd72f6fd005453249f1122a7ea1f26d91afa1fb7ae0e30bfb1523ae018636b6cce3e36c847073e69d95082bc3d54fde201f0bca003
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-