DllRegisterServer
Behavioral task
behavioral1
Sample
d294955e1962a7342f6706facfbc735b8d84e94bf1de9ed0d7aa87bfc838f1f8.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
d294955e1962a7342f6706facfbc735b8d84e94bf1de9ed0d7aa87bfc838f1f8.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
d294955e1962a7342f6706facfbc735b8d84e94bf1de9ed0d7aa87bfc838f1f8.zip
-
Size
105KB
-
MD5
f5369c64e90755f94cba233dd1854df1
-
SHA1
6b0cf85a3588041b00c471b03042467a8748ae88
-
SHA256
bf98283002b88ad478a18eabbc356dd1c4c4a03d716b408b06610ee2a380eae1
-
SHA512
3d6010f64bab8c01a069afa1354944ea66342548ab560b6ae38949fc04423f5a0bfd0f1582f832f1cec71b02b78d1b84dabfdffae7c2b7594634cceb1bfc664c
Malware Config
Extracted
Family
zloader
Botnet
10/03
C2
https://dhteijwrb.host/milagrecf.php
https://aquolepp.pw/milagrecf.php
rc4.plain
Signatures
-
Zloader family
Files
-
d294955e1962a7342f6706facfbc735b8d84e94bf1de9ed0d7aa87bfc838f1f8.zip.zip
Password: infected
-
d294955e1962a7342f6706facfbc735b8d84e94bf1de9ed0d7aa87bfc838f1f8.dll.dll windows x86 regsvr32
Exports
Exports