General

  • Target

    bd40fbd6619e2dff958bd5398b0c615921ffd28fe9410e933fe117bca2ed4f9c.zip

  • Size

    283KB

  • Sample

    210302-hdmh35eps2

  • MD5

    595cbabf4ee34e78ffddcabe298825bf

  • SHA1

    eea7f703bcab5bdd4fa254ea12bb454c282537cf

  • SHA256

    346ac4db6c394062cb9b3abf2a843b16dd57ef47ae5406b56bf515da929e6adb

  • SHA512

    7fd9122050d37fdbd449a2876022cc67ade853c25353e4313dbaa18807287eca334cacf9e0191534715c60347425949ef4fef45eb8dbaa3b2649230ac2f47af4

Malware Config

Extracted

Family

zloader

Botnet

nut

Campaign

22/02

C2

https://sanfilippowholesale.ca/post.php

https://veprotech.com/post.php

https://globalgroots.com/post.php

https://silicontradewind.com/post.php

https://dhyanalingagranites.in/post.php

https://onushondhanbarta.com/post.php

https://avcity.in/post.php

https://docapiridelli.ml/post.php

rc4.plain
rsa_pubkey.plain

Targets

    • Target

      bd40fbd6619e2dff958bd5398b0c615921ffd28fe9410e933fe117bca2ed4f9c.dll

    • Size

      368KB

    • MD5

      116347dee5de17177b0e19cb2656d94d

    • SHA1

      1bc94b97c99c08ffc1f2849a2dfce60569ddbc71

    • SHA256

      bd40fbd6619e2dff958bd5398b0c615921ffd28fe9410e933fe117bca2ed4f9c

    • SHA512

      a405bbeb5829045817817ff4e993153e5196642d32cdeca5964d1787a2451a7d39624c293e59de8d0c485ee57a964814c167a68abb19d6f23308ffff6f7e2fdb

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Blocklisted process makes network request

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks