Resubmissions

22-11-2023 17:02

231122-vkac9adg64 10

19-01-2021 19:24

210119-s26yznnqsn 10

19-11-2020 13:14

201119-s41ec6lt86 10

Analysis

  • max time kernel
    75s
  • max time network
    170s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    19-01-2021 19:24

General

  • Target

    6a9e7107c97762eb1196a64baeadb291.exe

  • Size

    209KB

  • MD5

    417457ac3e000697959127259c73ee46

  • SHA1

    e060125845cc1c4098f87632f453969ad9ec01ab

  • SHA256

    d74e9aa01bffcb4944742f93ad5b87d4c057f4faad008f04f7397634fe3f234d

  • SHA512

    7e2dac573db052dc03d89499d9e879bc530e94f3d1235898064aa87e99aee8fced1ac4aeeba342b77afd1480e0584a238ad7cd79cdef9c562bb89d65ba365b31

Malware Config

Extracted

Family

zloader

Botnet

CanadaLoads

Campaign

Nerino

C2

https://monanuslanus.com/bFnF0y1r/7QKpXmV3Pz.php

https://lericastrongs.com/bFnF0y1r/7QKpXmV3Pz.php

https://hyllionsudks.com/bFnF0y1r/7QKpXmV3Pz.php

https://crimewasddef.com/bFnF0y1r/7QKpXmV3Pz.php

https://derekdsingel.com/bFnF0y1r/7QKpXmV3Pz.php

https://simplereffiret.com/bFnF0y1r/7QKpXmV3Pz.php

https://regeerscomba.com/bFnF0y1r/7QKpXmV3Pz.php

rc4.plain
rsa_pubkey.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a9e7107c97762eb1196a64baeadb291.exe
    "C:\Users\Admin\AppData\Local\Temp\6a9e7107c97762eb1196a64baeadb291.exe"
    1⤵
      PID:628
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe
        2⤵
          PID:2652

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/628-2-0x0000000004EC0000-0x0000000004EC1000-memory.dmp
        Filesize

        4KB

      • memory/628-3-0x00000000031C0000-0x00000000031E2000-memory.dmp
        Filesize

        136KB

      • memory/628-4-0x0000000000400000-0x0000000000426000-memory.dmp
        Filesize

        152KB

      • memory/2652-5-0x0000000000000000-mapping.dmp
      • memory/2652-6-0x00000000004E0000-0x0000000000506000-memory.dmp
        Filesize

        152KB