DllRegisterServer
Behavioral task
behavioral1
Sample
cf8e50db2ca682dbc80110f394aa4bbd7b59a60ac6e981dcaab607d09b7f01e8.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
cf8e50db2ca682dbc80110f394aa4bbd7b59a60ac6e981dcaab607d09b7f01e8.zip
-
Size
111KB
-
MD5
77e4b446ad42b259dfe24b350ad96e6e
-
SHA1
52fc4a81e9aecaef860c3b9ac3871dbd53799d1b
-
SHA256
d26a36d47e1d5c998acaaf9ece01b9bb2680a4f60e56172063e5dcd6b2236163
-
SHA512
f8257f28ef7c5b94a762ef25e35f9827ccc1d057cc6d3824dc0a5562073b384f4fdb283b22a4a085644fa8d0fc0d59ad025183bdf14aed1b3877b578df268897
Malware Config
Extracted
Family
zloader
Botnet
07/04
C2
https://xyajbocpggsr.site/wp-config.php
https://ooygvpxrb.pw/wp-config.php
rc4.plain
Signatures
-
Zloader family
Files
-
cf8e50db2ca682dbc80110f394aa4bbd7b59a60ac6e981dcaab607d09b7f01e8.zip.zip
Password: infected
-
cf8e50db2ca682dbc80110f394aa4bbd7b59a60ac6e981dcaab607d09b7f01e8.dll.dll windows x86 regsvr32
Exports
Exports