DllRegisterServer
Behavioral task
behavioral1
Sample
5cb7f1eb5a3bc9d05896b7691f88b58c029580b5f24d2726706c680b710f0b94.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
5cb7f1eb5a3bc9d05896b7691f88b58c029580b5f24d2726706c680b710f0b94.zip
-
Size
113KB
-
MD5
a9c39c250146af72962ae0e1bf0b5621
-
SHA1
5be7d87172d1e444617fb18920205ca09fd715e5
-
SHA256
68438f6f427ae6d0a789715874296bad56eb46248e498e4ccd21bac412c2b142
-
SHA512
0cd798ace3fc8667e7ca41b57bcc7c65a32df7eb2a4fc270dd9c5d37401e6e51ebab63f89d2c61c28e4fe7c167d1a69e9de79635b31f1207dcbee69af0ac8212
Malware Config
Extracted
Family
zloader
Botnet
miguel
Campaign
20/04
C2
https://dcaiqjgnbt.icu/wp-config.php
https://nmttxggtb.press/wp-config.php
rc4.plain
Signatures
-
Zloader family
Files
-
5cb7f1eb5a3bc9d05896b7691f88b58c029580b5f24d2726706c680b710f0b94.zip.zip
Password: infected
-
5cb7f1eb5a3bc9d05896b7691f88b58c029580b5f24d2726706c680b710f0b94.dll.dll windows x86 regsvr32
Exports
Exports