Resubmissions

24-05-2023 17:16

230524-vs7cysea9x 10

09-11-2020 20:02

201109-kefnpvgfd6 10

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    09-11-2020 20:02

General

  • Target

    readme.exe

  • Size

    348KB

  • MD5

    8c6810ccbf8b94ad18edabe648ffd504

  • SHA1

    9f3770c114956fb31d04ec3020fe4da03a8ac2d4

  • SHA256

    b8f848f137a23fe046b4701a67d07c8e7e1a8fdb066f318424caede7a1e69530

  • SHA512

    7bf15296bbdce5aee540b9a6738c65a3f54b773f6aa50b27a98ad8c33544ff60625f650c8bb90fa17a0c60e8b799a88536f5609b41a94784fcb283b810f0b7b9

Malware Config

Extracted

Family

zloader

Botnet

CanadaLoads

Campaign

Spam

C2

https://23d8s23hs89j239sj23.com/jbYm9bt/NlGkb4ivk.php

https://3reh8rd23js9.com/jbYm9bt/NlGkb4ivk.php

https://4f394j89d3j4d89j34d.com/jbYm9bt/NlGkb4ivk.php

https://d823hrd9239sdj2.com/jbYm9bt/NlGkb4ivk.php

https://js823hs23js.com/jbYm9bt/NlGkb4ivk.php

https://oidjweidj34rd3.com/jbYm9bt/NlGkb4ivk.php

https://qwd8s3j8s23h8s.com/jbYm9bt/NlGkb4ivk.php

https://s28hs823hs823js.com/jbYm9bt/NlGkb4ivk.php

https://wd23h8qsh8qhs823qs.com/jbYm9bt/NlGkb4ivk.php

rc4.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\readme.exe
    "C:\Users\Admin\AppData\Local\Temp\readme.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1036
    • C:\Windows\SysWOW64\msiexec.exe
      msiexec.exe
      2⤵
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      PID:1476

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1036-0-0x0000000002DF6000-0x0000000002DF7000-memory.dmp

    Filesize

    4KB

  • memory/1036-1-0x00000000049B0000-0x00000000049B1000-memory.dmp

    Filesize

    4KB

  • memory/1476-2-0x0000000000C40000-0x0000000000C72000-memory.dmp

    Filesize

    200KB