General

  • Target

    case (4335).xls

  • Size

    153KB

  • Sample

    210126-15b7wdmnj2

  • MD5

    bf86559630b855e4bf2c54d641147b24

  • SHA1

    182cbac1bdd020fa5fee6ed9d6a50d1071fbe320

  • SHA256

    31ea3370ca06a2af45514a59a0ae49dc62ac34bc4dce44402f169a9d6fb93853

  • SHA512

    f188cdd1ae628850d5a48f32ec17d399fdbed68ed6a6e92977374dac61a0d3286f0a2c1ff83ae4b70af219c9f3d7b49aa4ac5125f63f7f75fc6b70a17a4ddc83

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://rnollg.com/kev/scfrd.dll

Extracted

Family

zloader

Botnet

kev

Campaign

26/01

C2

https://gadgetswolf.com/post.php

https://homesoapmolds.com/post.php

https://govemedico.tk/post.php

rc4.plain
rsa_pubkey.plain

Targets

    • Target

      case (4335).xls

    • Size

      153KB

    • MD5

      bf86559630b855e4bf2c54d641147b24

    • SHA1

      182cbac1bdd020fa5fee6ed9d6a50d1071fbe320

    • SHA256

      31ea3370ca06a2af45514a59a0ae49dc62ac34bc4dce44402f169a9d6fb93853

    • SHA512

      f188cdd1ae628850d5a48f32ec17d399fdbed68ed6a6e92977374dac61a0d3286f0a2c1ff83ae4b70af219c9f3d7b49aa4ac5125f63f7f75fc6b70a17a4ddc83

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks