General

  • Target

    6405581050249216.zip

  • Size

    331KB

  • Sample

    201216-qk49hyx17x

  • MD5

    426001be710a41331c78ba214db2ebad

  • SHA1

    9f115407d61de4f9d55fa7282b885da58283693c

  • SHA256

    73f45ee75d9554d86f8c65d3b1d47910c1fac7e230c848c9c8907d8cc72f1675

  • SHA512

    d22e9e2d62ac9744974d7c6fdba6a1e50b5cdcd2637d05f4de03266740124ebf776c275584af1485e2ac84404d226fede30bd0c20b8326f8cfd9fbb09c49c6fb

Malware Config

Extracted

Family

zloader

Botnet

nut

Campaign

11/12

C2

https://www.businessinsurancelaw.com/wp-punch.php

https://squire.ae/wp-punch.php

https://lamun.pk/wp-punch.php

https://www.rcclabbd.com/wp-punch.php

https://thecype.com/wp-punch.php

https://theterteboltallbrow.tk/wp-smarts.php

rc4.plain
rsa_pubkey.plain

Targets

    • Target

      0e70968a9326d7abc103c04b4c355649c837c69c92b83af9ac4e2c1c123f0948

    • Size

      520KB

    • MD5

      976a3e1f72f6d0e32e5eaab7db1c93b4

    • SHA1

      77aff7c16b978445d7b4b7a9d2b1eaef0592b439

    • SHA256

      0e70968a9326d7abc103c04b4c355649c837c69c92b83af9ac4e2c1c123f0948

    • SHA512

      a29993ba569f5ef123054c8dd8a0ed71c04c5dfb573dd2c9917deed7f1c870732c24bfd2c387a93c539a09d635dde4d89dc048179e3dfc7e5edc9da679d54e0e

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Blocklisted process makes network request

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks