Behavioral task
behavioral1
Sample
778b9b70005df81ab976c71250ebe587f0eeb017c380e69405dc86692a3a4495.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
778b9b70005df81ab976c71250ebe587f0eeb017c380e69405dc86692a3a4495.zip
-
Size
80KB
-
MD5
4a3aead1e9843a129623d9445833e6df
-
SHA1
a785c832443585dc28eed06e051634a43696bc73
-
SHA256
d45d3d2fa8833b85608b6afa7b29e82675fd50e9701b0418d1c359c61829bdb1
-
SHA512
8323d41d28e3975da0f3a6757fb656225d7ecca03c0a4bb9d9aa22d64e708ed11560a9f3e5f89bc7ca03ebc0f70ff056ef3858b7595fe89651ef58202ac43b23
Malware Config
Extracted
Family
zloader
Botnet
kev
Campaign
26/01
C2
https://gadgetswolf.com/post.php
https://homesoapmolds.com/post.php
https://govemedico.tk/post.php
rc4.plain
rsa_pubkey.plain
Signatures
-
Zloader family
Files
-
778b9b70005df81ab976c71250ebe587f0eeb017c380e69405dc86692a3a4495.zip.zip
Password: infected
-
778b9b70005df81ab976c71250ebe587f0eeb017c380e69405dc86692a3a4495.dll.dll windows x86