DllRegisterServer
Behavioral task
behavioral1
Sample
95560f1a465e8ba87a73f8e60a6657545073d55c3b5cfc2ffdaf3d69d46afcf9.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
95560f1a465e8ba87a73f8e60a6657545073d55c3b5cfc2ffdaf3d69d46afcf9.zip
-
Size
157KB
-
MD5
963133f675a671fd0057b04a4c86da64
-
SHA1
ff3fb1cc9ef66fb6b065d4b2900cb8a5adb06449
-
SHA256
1e556f1e19659679408a52f59fce761ad304fecfd563566aa000bd70895ac20b
-
SHA512
0d8b6377b4c4c019ae29ba3c2ede652de1aa407b8f7c40d09aac4ab22e2b47a5785443a9f707d9f532331f5f238dbb74f0d49ea60b2335fb83f130d91ec04a22
Malware Config
Extracted
Family
zloader
Botnet
25/03
C2
https://wgyvjbse.pw/milagrecf.php
https://botiq.xyz/milagrecf.php
rc4.plain
Signatures
-
Zloader family
Files
-
95560f1a465e8ba87a73f8e60a6657545073d55c3b5cfc2ffdaf3d69d46afcf9.zip.zip
Password: infected
-
95560f1a465e8ba87a73f8e60a6657545073d55c3b5cfc2ffdaf3d69d46afcf9.dll.dll windows x86 regsvr32
Exports
Exports