General
-
Target
6405581050249216.zip
-
Size
331KB
-
Sample
201216-qk49hyx17x
-
MD5
426001be710a41331c78ba214db2ebad
-
SHA1
9f115407d61de4f9d55fa7282b885da58283693c
-
SHA256
73f45ee75d9554d86f8c65d3b1d47910c1fac7e230c848c9c8907d8cc72f1675
-
SHA512
d22e9e2d62ac9744974d7c6fdba6a1e50b5cdcd2637d05f4de03266740124ebf776c275584af1485e2ac84404d226fede30bd0c20b8326f8cfd9fbb09c49c6fb
Static task
static1
Behavioral task
behavioral1
Sample
0e70968a9326d7abc103c04b4c355649c837c69c92b83af9ac4e2c1c123f0948.dll
Resource
win7v20201028
Malware Config
Extracted
zloader
nut
11/12
https://www.businessinsurancelaw.com/wp-punch.php
https://squire.ae/wp-punch.php
https://lamun.pk/wp-punch.php
https://www.rcclabbd.com/wp-punch.php
https://thecype.com/wp-punch.php
https://theterteboltallbrow.tk/wp-smarts.php
Targets
-
-
Target
0e70968a9326d7abc103c04b4c355649c837c69c92b83af9ac4e2c1c123f0948
-
Size
520KB
-
MD5
976a3e1f72f6d0e32e5eaab7db1c93b4
-
SHA1
77aff7c16b978445d7b4b7a9d2b1eaef0592b439
-
SHA256
0e70968a9326d7abc103c04b4c355649c837c69c92b83af9ac4e2c1c123f0948
-
SHA512
a29993ba569f5ef123054c8dd8a0ed71c04c5dfb573dd2c9917deed7f1c870732c24bfd2c387a93c539a09d635dde4d89dc048179e3dfc7e5edc9da679d54e0e
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-