General
-
Target
str.dll
-
Size
536KB
-
Sample
201109-ls12xp9agx
-
MD5
bfd5e43617896f082948b3fcbc4839f8
-
SHA1
0304d3a521a791359b16813df513feb891167e5a
-
SHA256
467ea1ab80fb43e2d59cdf16480ed80d0edd43a3a0baa4748300be7024d2b92e
-
SHA512
ec7392577b8f67f6e248b81b6d8d1333d7a15c9b7b957862b4b7c39e59e7b2849ad026850b78fd629f31a5e2287702a0a1486335d7f7f3dc356861cdf5056ab1
Static task
static1
Behavioral task
behavioral1
Sample
str.dll
Resource
win7v20201028
Malware Config
Extracted
zloader
bot5
bot5
https://militanttra.at/owg.php
Targets
-
-
Target
str.dll
-
Size
536KB
-
MD5
bfd5e43617896f082948b3fcbc4839f8
-
SHA1
0304d3a521a791359b16813df513feb891167e5a
-
SHA256
467ea1ab80fb43e2d59cdf16480ed80d0edd43a3a0baa4748300be7024d2b92e
-
SHA512
ec7392577b8f67f6e248b81b6d8d1333d7a15c9b7b957862b4b7c39e59e7b2849ad026850b78fd629f31a5e2287702a0a1486335d7f7f3dc356861cdf5056ab1
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-