General
-
Target
n1.bin
-
Size
282KB
-
Sample
201225-sapaaaxahj
-
MD5
3b0c5d532922be20ae151490e7109c60
-
SHA1
4c3ba395594a5117d468084330902739ca08de0e
-
SHA256
9081546b7e05805a5496bfcee49b3c736cb55b49e467529c7d7ac60781b29880
-
SHA512
6a724591ee57cbc2ce9351ac556e666040f8ba6bcd37112b960a4fc0a16b493a7b94b0e70f9efe1a1d53597ec8a0a5ef08bbfc91ef4ace776f1df0f8c1555f4e
Static task
static1
Behavioral task
behavioral1
Sample
n1.bin.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
n1.bin.exe
Resource
win10v20201028
Malware Config
Extracted
zloader
r2
r2
https://notsweets.net/LKhwojehDgwegSDG/gateJKjdsh.php
https://olpons.com/LKhwojehDgwegSDG/gateJKjdsh.php
https://karamelliar.org/LKhwojehDgwegSDG/gateJKjdsh.php
https://dogrunn.com/LKhwojehDgwegSDG/gateJKjdsh.php
https://azoraz.net/LKhwojehDgwegSDG/gateJKjdsh.php
Targets
-
-
Target
n1.bin
-
Size
282KB
-
MD5
3b0c5d532922be20ae151490e7109c60
-
SHA1
4c3ba395594a5117d468084330902739ca08de0e
-
SHA256
9081546b7e05805a5496bfcee49b3c736cb55b49e467529c7d7ac60781b29880
-
SHA512
6a724591ee57cbc2ce9351ac556e666040f8ba6bcd37112b960a4fc0a16b493a7b94b0e70f9efe1a1d53597ec8a0a5ef08bbfc91ef4ace776f1df0f8c1555f4e
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-