General

  • Target

    str.dll

  • Size

    536KB

  • Sample

    201109-ls12xp9agx

  • MD5

    bfd5e43617896f082948b3fcbc4839f8

  • SHA1

    0304d3a521a791359b16813df513feb891167e5a

  • SHA256

    467ea1ab80fb43e2d59cdf16480ed80d0edd43a3a0baa4748300be7024d2b92e

  • SHA512

    ec7392577b8f67f6e248b81b6d8d1333d7a15c9b7b957862b4b7c39e59e7b2849ad026850b78fd629f31a5e2287702a0a1486335d7f7f3dc356861cdf5056ab1

Malware Config

Extracted

Family

zloader

Botnet

bot5

Campaign

bot5

C2

https://militanttra.at/owg.php

rc4.plain
rsa_pubkey.plain

Targets

    • Target

      str.dll

    • Size

      536KB

    • MD5

      bfd5e43617896f082948b3fcbc4839f8

    • SHA1

      0304d3a521a791359b16813df513feb891167e5a

    • SHA256

      467ea1ab80fb43e2d59cdf16480ed80d0edd43a3a0baa4748300be7024d2b92e

    • SHA512

      ec7392577b8f67f6e248b81b6d8d1333d7a15c9b7b957862b4b7c39e59e7b2849ad026850b78fd629f31a5e2287702a0a1486335d7f7f3dc356861cdf5056ab1

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks