General

  • Target

    116347dee5de17177b0e19cb2656d94d

  • Size

    368KB

  • Sample

    210225-e8bqwdpfgn

  • MD5

    116347dee5de17177b0e19cb2656d94d

  • SHA1

    1bc94b97c99c08ffc1f2849a2dfce60569ddbc71

  • SHA256

    bd40fbd6619e2dff958bd5398b0c615921ffd28fe9410e933fe117bca2ed4f9c

  • SHA512

    a405bbeb5829045817817ff4e993153e5196642d32cdeca5964d1787a2451a7d39624c293e59de8d0c485ee57a964814c167a68abb19d6f23308ffff6f7e2fdb

Malware Config

Extracted

Family

zloader

Botnet

nut

Campaign

22/02

C2

https://sanfilippowholesale.ca/post.php

https://veprotech.com/post.php

https://globalgroots.com/post.php

https://silicontradewind.com/post.php

https://dhyanalingagranites.in/post.php

https://onushondhanbarta.com/post.php

https://avcity.in/post.php

https://docapiridelli.ml/post.php

rc4.plain
rsa_pubkey.plain

Targets

    • Target

      116347dee5de17177b0e19cb2656d94d

    • Size

      368KB

    • MD5

      116347dee5de17177b0e19cb2656d94d

    • SHA1

      1bc94b97c99c08ffc1f2849a2dfce60569ddbc71

    • SHA256

      bd40fbd6619e2dff958bd5398b0c615921ffd28fe9410e933fe117bca2ed4f9c

    • SHA512

      a405bbeb5829045817817ff4e993153e5196642d32cdeca5964d1787a2451a7d39624c293e59de8d0c485ee57a964814c167a68abb19d6f23308ffff6f7e2fdb

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Blocklisted process makes network request

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks