General

  • Target

    case (1522).xls

  • Size

    153KB

  • Sample

    210126-n79hc9hh7x

  • MD5

    933ac69cb772d6e28636a81fc7665a26

  • SHA1

    7bb7870ebb261a2e0302600330abbc819d00acd3

  • SHA256

    d4592471179f7d3fbd94be05591c09c74b0d8b7dcca580504694c7514c1d9ef0

  • SHA512

    e4be1fa90192bb991468ce7edd1b951358de9287f26a1975a82ac60ded95ca9d337a0b89dc1deacc9ef836077c7345c4067de99bf82d15a406b6b3ce53ad8b52

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://rnollg.com/kev/scfrd.dll

Extracted

Family

zloader

Botnet

kev

Campaign

26/01

C2

https://gadgetswolf.com/post.php

https://homesoapmolds.com/post.php

https://govemedico.tk/post.php

rc4.plain
rsa_pubkey.plain

Targets

    • Target

      case (1522).xls

    • Size

      153KB

    • MD5

      933ac69cb772d6e28636a81fc7665a26

    • SHA1

      7bb7870ebb261a2e0302600330abbc819d00acd3

    • SHA256

      d4592471179f7d3fbd94be05591c09c74b0d8b7dcca580504694c7514c1d9ef0

    • SHA512

      e4be1fa90192bb991468ce7edd1b951358de9287f26a1975a82ac60ded95ca9d337a0b89dc1deacc9ef836077c7345c4067de99bf82d15a406b6b3ce53ad8b52

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks