Resubmissions

19-01-2021 19:24

210119-s26yznnqsn 10

19-11-2020 13:14

201119-s41ec6lt86 10

Analysis

  • max time kernel
    39s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    19-01-2021 19:24

General

  • Target

    6a9e7107c97762eb1196a64baeadb291.exe

  • Size

    209KB

  • MD5

    417457ac3e000697959127259c73ee46

  • SHA1

    e060125845cc1c4098f87632f453969ad9ec01ab

  • SHA256

    d74e9aa01bffcb4944742f93ad5b87d4c057f4faad008f04f7397634fe3f234d

  • SHA512

    7e2dac573db052dc03d89499d9e879bc530e94f3d1235898064aa87e99aee8fced1ac4aeeba342b77afd1480e0584a238ad7cd79cdef9c562bb89d65ba365b31

Malware Config

Extracted

Family

zloader

Botnet

CanadaLoads

Campaign

Nerino

C2

https://monanuslanus.com/bFnF0y1r/7QKpXmV3Pz.php

https://lericastrongs.com/bFnF0y1r/7QKpXmV3Pz.php

https://hyllionsudks.com/bFnF0y1r/7QKpXmV3Pz.php

https://crimewasddef.com/bFnF0y1r/7QKpXmV3Pz.php

https://derekdsingel.com/bFnF0y1r/7QKpXmV3Pz.php

https://simplereffiret.com/bFnF0y1r/7QKpXmV3Pz.php

https://regeerscomba.com/bFnF0y1r/7QKpXmV3Pz.php

rc4.plain
rsa_pubkey.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a9e7107c97762eb1196a64baeadb291.exe
    "C:\Users\Admin\AppData\Local\Temp\6a9e7107c97762eb1196a64baeadb291.exe"
    PID:1436
    • C:\Windows\SysWOW64\msiexec.exe
      msiexec.exe
      PID:652

Network

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

          Discovery

            Execution

              Exfiltration

                Impact

                  Initial Access

                    Lateral Movement

                      Persistence

                        Privilege Escalation

                          Replay Monitor

                          00:00 00:00

                          Downloads

                          • memory/300-11-0x000007FEF5CF0000-0x000007FEF5F6A000-memory.dmp
                          • memory/652-8-0x0000000000000000-mapping.dmp
                          • memory/652-9-0x0000000075ED1000-0x0000000075ED3000-memory.dmp
                          • memory/652-10-0x0000000000130000-0x0000000000156000-memory.dmp
                          • memory/1436-2-0x0000000004810000-0x0000000004821000-memory.dmp
                          • memory/1436-3-0x00000000001B0000-0x00000000001D2000-memory.dmp
                          • memory/1436-4-0x0000000000400000-0x0000000000426000-memory.dmp
                          • memory/1436-5-0x0000000004810000-0x0000000004821000-memory.dmp