General

  • Target

    case (4374).xls

  • Size

    153KB

  • Sample

    210126-srjs948kde

  • MD5

    2bc3acec77fec6f8a78b77c5efb5c5ee

  • SHA1

    e4b3f2149b6d7b8ad912b127bd8ad9fb0eb0246b

  • SHA256

    28ce05e2ebeec4b1754d5ffcfe3e4486e8e9201f375da899aef2ea6d3b02dd60

  • SHA512

    a05914b1504997c5e52468987a20b9f2b877d665f510d985b0aa9798c936252d39986efd3e49f929c383550db1a200ba2c66c049e6340ef391d922553e828854

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://coopacaustro.com/kev/scfrd.dll

Extracted

Family

zloader

Botnet

kev

Campaign

26/01

C2

https://gadgetswolf.com/post.php

https://homesoapmolds.com/post.php

https://govemedico.tk/post.php

rc4.plain
rsa_pubkey.plain

Targets

    • Target

      case (4374).xls

    • Size

      153KB

    • MD5

      2bc3acec77fec6f8a78b77c5efb5c5ee

    • SHA1

      e4b3f2149b6d7b8ad912b127bd8ad9fb0eb0246b

    • SHA256

      28ce05e2ebeec4b1754d5ffcfe3e4486e8e9201f375da899aef2ea6d3b02dd60

    • SHA512

      a05914b1504997c5e52468987a20b9f2b877d665f510d985b0aa9798c936252d39986efd3e49f929c383550db1a200ba2c66c049e6340ef391d922553e828854

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks