DllRegisterServer
Behavioral task
behavioral1
Sample
1b81a3ffd4544dc7667376091f8cd5fbbe282bbcf71e39ee9c002ca8335548bf.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1b81a3ffd4544dc7667376091f8cd5fbbe282bbcf71e39ee9c002ca8335548bf.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
1b81a3ffd4544dc7667376091f8cd5fbbe282bbcf71e39ee9c002ca8335548bf.zip
-
Size
105KB
-
MD5
a6453d1c0db36241db325376f08b4811
-
SHA1
1d9dec106841a915efdf924349934eb2fa796fca
-
SHA256
ccf311ab645f0f0fb20801a031b93935eddc6848e56e99f7420269438229c262
-
SHA512
98ecd751ad7e815e271963ba5ded2b3d3766186e0a47664ee2e0a661f7d52a72ef00fc5034a0a00994ba21c040181d29980cec42179abb83e440d6b1bb6d007f
Malware Config
Extracted
Family
zloader
Botnet
10/03
C2
https://dhteijwrb.host/milagrecf.php
https://aquolepp.pw/milagrecf.php
rc4.plain
Signatures
-
Zloader family
Files
-
1b81a3ffd4544dc7667376091f8cd5fbbe282bbcf71e39ee9c002ca8335548bf.zip.zip
Password: infected
-
1b81a3ffd4544dc7667376091f8cd5fbbe282bbcf71e39ee9c002ca8335548bf.dll.dll windows x86 regsvr32
Exports
Exports