General

  • Target

    0e70968a9326d7abc103c04b4c355649c837c69c92b83af9ac4e2c1c123f0948.zip

  • Size

    330KB

  • Sample

    210302-sgyn6vav6n

  • MD5

    7db988f9a8c90231d170fc0770238361

  • SHA1

    98d7cb40e43956b1ad396ad19f037d054add7896

  • SHA256

    ce04d541535f01631b520313ab93ade2d2759e5e72ac2c73b4edccc48de91e71

  • SHA512

    f76ec79c11cac079eadf03435fa0db1b8642ff7b679bedf15f0ff26388ac56f268f9da4ee916d9d57cc0457bac6688ea647a0183cb448f462138ee78a110b7c3

Malware Config

Extracted

Family

zloader

Botnet

nut

Campaign

11/12

C2

https://www.businessinsurancelaw.com/wp-punch.php

https://squire.ae/wp-punch.php

https://lamun.pk/wp-punch.php

https://www.rcclabbd.com/wp-punch.php

https://thecype.com/wp-punch.php

https://theterteboltallbrow.tk/wp-smarts.php

rc4.plain
rsa_pubkey.plain

Targets

    • Target

      0e70968a9326d7abc103c04b4c355649c837c69c92b83af9ac4e2c1c123f0948.dll

    • Size

      520KB

    • MD5

      976a3e1f72f6d0e32e5eaab7db1c93b4

    • SHA1

      77aff7c16b978445d7b4b7a9d2b1eaef0592b439

    • SHA256

      0e70968a9326d7abc103c04b4c355649c837c69c92b83af9ac4e2c1c123f0948

    • SHA512

      a29993ba569f5ef123054c8dd8a0ed71c04c5dfb573dd2c9917deed7f1c870732c24bfd2c387a93c539a09d635dde4d89dc048179e3dfc7e5edc9da679d54e0e

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Blocklisted process makes network request

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks