Analysis
-
max time kernel
71s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-11-2020 19:15
Static task
static1
Behavioral task
behavioral1
Sample
2.bin.exe
Resource
win7v20201028
General
-
Target
2.bin.exe
-
Size
194KB
-
MD5
f001a34284907effccd73401f3c67024
-
SHA1
9646d4bce167034408e00da8e8e0b967c8d824ca
-
SHA256
c3843e4e47fdd596ea21993cb29db052bd6d0393e6bcc62821f12a5552781fec
-
SHA512
6b5029bfe8ecd4611abacc88415213e3937c0ac9a21114b211bdcbff45dc124758cca73275ea9285775dcc970d9d0bee245c37d64ec082aeb66b3351d2587a24
Malware Config
Extracted
zloader
r1
r1
https://notsweets.net/LKhwojehDgwegSDG/gateJKjdsh.php
https://olpons.com/LKhwojehDgwegSDG/gateJKjdsh.php
https://karamelliar.org/LKhwojehDgwegSDG/gateJKjdsh.php
https://dogrunn.com/LKhwojehDgwegSDG/gateJKjdsh.php
https://azoraz.net/LKhwojehDgwegSDG/gateJKjdsh.php
Signatures
Processes
-
C:\Users\Admin\AppData\Local\Temp\2.bin.exe"C:\Users\Admin\AppData\Local\Temp\2.bin.exe"
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
Downloads
-
memory/1304-0-0x00000000009E6000-0x00000000009E7000-memory.dmpFilesize
4KB
-
memory/1304-1-0x0000000002840000-0x0000000002841000-memory.dmpFilesize
4KB
-
memory/3296-2-0x0000000000690000-0x00000000006B8000-memory.dmpFilesize
160KB
-
memory/3296-3-0x0000000000000000-mapping.dmp