Resubmissions

03-07-2024 16:04

240703-thygmaycpc 10

01-07-2024 18:12

240701-ws6xvswbkj 10

01-07-2024 18:03

240701-wm5sls1gka 10

01-07-2024 18:03

240701-wm39sa1gjf 10

01-07-2024 18:03

240701-wm2e7avhkj 10

01-07-2024 18:03

240701-wmzxcs1fre 10

01-07-2024 18:02

240701-wmzats1frc 10

01-07-2024 18:02

240701-wmvbwa1fqh 10

22-11-2023 17:02

231122-vkac9adg64 10

Analysis

  • max time kernel
    39s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    19-01-2021 19:24

General

  • Target

    6a9e7107c97762eb1196a64baeadb291.exe

  • Size

    209KB

  • MD5

    417457ac3e000697959127259c73ee46

  • SHA1

    e060125845cc1c4098f87632f453969ad9ec01ab

  • SHA256

    d74e9aa01bffcb4944742f93ad5b87d4c057f4faad008f04f7397634fe3f234d

  • SHA512

    7e2dac573db052dc03d89499d9e879bc530e94f3d1235898064aa87e99aee8fced1ac4aeeba342b77afd1480e0584a238ad7cd79cdef9c562bb89d65ba365b31

Malware Config

Extracted

Family

zloader

Botnet

CanadaLoads

Campaign

Nerino

C2

https://monanuslanus.com/bFnF0y1r/7QKpXmV3Pz.php

https://lericastrongs.com/bFnF0y1r/7QKpXmV3Pz.php

https://hyllionsudks.com/bFnF0y1r/7QKpXmV3Pz.php

https://crimewasddef.com/bFnF0y1r/7QKpXmV3Pz.php

https://derekdsingel.com/bFnF0y1r/7QKpXmV3Pz.php

https://simplereffiret.com/bFnF0y1r/7QKpXmV3Pz.php

https://regeerscomba.com/bFnF0y1r/7QKpXmV3Pz.php

rc4.plain
rsa_pubkey.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a9e7107c97762eb1196a64baeadb291.exe
    "C:\Users\Admin\AppData\Local\Temp\6a9e7107c97762eb1196a64baeadb291.exe"
    1⤵
      PID:1436
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe
        2⤵
          PID:652

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/300-11-0x000007FEF5CF0000-0x000007FEF5F6A000-memory.dmp
        Filesize

        2.5MB

      • memory/652-8-0x0000000000000000-mapping.dmp
      • memory/652-9-0x0000000075ED1000-0x0000000075ED3000-memory.dmp
        Filesize

        8KB

      • memory/652-10-0x0000000000130000-0x0000000000156000-memory.dmp
        Filesize

        152KB

      • memory/1436-2-0x0000000004810000-0x0000000004821000-memory.dmp
        Filesize

        68KB

      • memory/1436-3-0x00000000001B0000-0x00000000001D2000-memory.dmp
        Filesize

        136KB

      • memory/1436-4-0x0000000000400000-0x0000000000426000-memory.dmp
        Filesize

        152KB

      • memory/1436-5-0x0000000004810000-0x0000000004821000-memory.dmp
        Filesize

        68KB