Analysis

  • max time kernel
    49s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    17-11-2020 12:03

General

  • Target

    6a9e7107c97762eb1196a64baeadb291.exe

  • Size

    209KB

  • MD5

    417457ac3e000697959127259c73ee46

  • SHA1

    e060125845cc1c4098f87632f453969ad9ec01ab

  • SHA256

    d74e9aa01bffcb4944742f93ad5b87d4c057f4faad008f04f7397634fe3f234d

  • SHA512

    7e2dac573db052dc03d89499d9e879bc530e94f3d1235898064aa87e99aee8fced1ac4aeeba342b77afd1480e0584a238ad7cd79cdef9c562bb89d65ba365b31

Malware Config

Extracted

Family

zloader

Botnet

CanadaLoads

Campaign

Nerino

C2

https://monanuslanus.com/bFnF0y1r/7QKpXmV3Pz.php

https://lericastrongs.com/bFnF0y1r/7QKpXmV3Pz.php

https://hyllionsudks.com/bFnF0y1r/7QKpXmV3Pz.php

https://crimewasddef.com/bFnF0y1r/7QKpXmV3Pz.php

https://derekdsingel.com/bFnF0y1r/7QKpXmV3Pz.php

https://simplereffiret.com/bFnF0y1r/7QKpXmV3Pz.php

https://regeerscomba.com/bFnF0y1r/7QKpXmV3Pz.php

rc4.plain
rsa_pubkey.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a9e7107c97762eb1196a64baeadb291.exe
    "C:\Users\Admin\AppData\Local\Temp\6a9e7107c97762eb1196a64baeadb291.exe"
    1⤵
      PID:1904

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1096-5-0x0000000000110000-0x0000000000136000-memory.dmp
      Filesize

      152KB

    • memory/1096-6-0x0000000000140000-0x0000000000141000-memory.dmp
      Filesize

      4KB

    • memory/1096-7-0x0000000000110000-0x0000000000136000-memory.dmp
      Filesize

      152KB

    • memory/1096-8-0x0000000000000000-mapping.dmp
    • memory/1904-0-0x000000000306B000-0x000000000306C000-memory.dmp
      Filesize

      4KB

    • memory/1904-1-0x0000000004A60000-0x0000000004A71000-memory.dmp
      Filesize

      68KB

    • memory/1904-2-0x0000000004A60000-0x0000000004A71000-memory.dmp
      Filesize

      68KB

    • memory/1932-9-0x000007FEF7020000-0x000007FEF729A000-memory.dmp
      Filesize

      2.5MB