Analysis

  • max time kernel
    55s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    04-03-2021 00:30

General

  • Target

    d74e9aa01bffcb4944742f93ad5b87d4c057f4faad008f04f7397634fe3f234d.exe

  • Size

    209KB

  • MD5

    417457ac3e000697959127259c73ee46

  • SHA1

    e060125845cc1c4098f87632f453969ad9ec01ab

  • SHA256

    d74e9aa01bffcb4944742f93ad5b87d4c057f4faad008f04f7397634fe3f234d

  • SHA512

    7e2dac573db052dc03d89499d9e879bc530e94f3d1235898064aa87e99aee8fced1ac4aeeba342b77afd1480e0584a238ad7cd79cdef9c562bb89d65ba365b31

Malware Config

Extracted

Family

zloader

Botnet

CanadaLoads

Campaign

Nerino

C2

https://monanuslanus.com/bFnF0y1r/7QKpXmV3Pz.php

https://lericastrongs.com/bFnF0y1r/7QKpXmV3Pz.php

https://hyllionsudks.com/bFnF0y1r/7QKpXmV3Pz.php

https://crimewasddef.com/bFnF0y1r/7QKpXmV3Pz.php

https://derekdsingel.com/bFnF0y1r/7QKpXmV3Pz.php

https://simplereffiret.com/bFnF0y1r/7QKpXmV3Pz.php

https://regeerscomba.com/bFnF0y1r/7QKpXmV3Pz.php

rc4.plain
rsa_pubkey.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d74e9aa01bffcb4944742f93ad5b87d4c057f4faad008f04f7397634fe3f234d.exe
    "C:\Users\Admin\AppData\Local\Temp\d74e9aa01bffcb4944742f93ad5b87d4c057f4faad008f04f7397634fe3f234d.exe"
    1⤵
      PID:2028
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe
        2⤵
          PID:1664

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/428-11-0x000007FEF7E60000-0x000007FEF80DA000-memory.dmp
        Filesize

        2.5MB

      • memory/1664-8-0x0000000000000000-mapping.dmp
      • memory/1664-9-0x0000000075C31000-0x0000000075C33000-memory.dmp
        Filesize

        8KB

      • memory/1664-10-0x0000000000090000-0x00000000000B6000-memory.dmp
        Filesize

        152KB

      • memory/2028-2-0x0000000004960000-0x0000000004971000-memory.dmp
        Filesize

        68KB

      • memory/2028-4-0x0000000000400000-0x0000000000426000-memory.dmp
        Filesize

        152KB

      • memory/2028-3-0x0000000000220000-0x0000000000242000-memory.dmp
        Filesize

        136KB

      • memory/2028-5-0x0000000004960000-0x0000000004971000-memory.dmp
        Filesize

        68KB