Analysis

  • max time kernel
    38s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    07-03-2021 14:10

General

  • Target

    1254515.dll

  • Size

    843KB

  • MD5

    c247335cbbfc2f607e43773d8c1c0f4a

  • SHA1

    707ab78dab9cf2b5277e668eb1c59be42af6549f

  • SHA256

    0d1774171175d150cc859a71fc56cd6a8132c9c679d3bd5c7f065126ed2a071e

  • SHA512

    6f2c9f2647703aeef053e00b298ce10c1636f839ab5310416b57b496f98e7ffc2fca311938794138930cee95b6dc964c51c81c0570739fc040563ccb79c1412d

Malware Config

Extracted

Family

zloader

Botnet

googleaktualizacija

Campaign

googleaktualizacija2

C2

https://iqowijsdakm.com/gate.php

https://wiewjdmkfjn.com/gate.php

https://dksaoidiakjd.com/gate.php

https://iweuiqjdakjd.com/gate.php

https://yuidskadjna.com/gate.php

https://olksmadnbdj.com/gate.php

https://odsakmdfnbs.com/gate.php

https://odsakjmdnhsaj.com/gate.php

https://odjdnhsaj.com/gate.php

https://odoishsaj.com/gate.php

rc4.plain
rsa_pubkey.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\1254515.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\1254515.dll
      2⤵
        PID:900
        • C:\Windows\SysWOW64\msiexec.exe
          msiexec.exe
          3⤵
            PID:340

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/340-7-0x0000000000000000-mapping.dmp
      • memory/340-9-0x0000000000090000-0x00000000000B6000-memory.dmp
        Filesize

        152KB

      • memory/900-3-0x0000000000000000-mapping.dmp
      • memory/900-4-0x0000000075EA1000-0x0000000075EA3000-memory.dmp
        Filesize

        8KB

      • memory/900-6-0x0000000002030000-0x000000000217B000-memory.dmp
        Filesize

        1.3MB

      • memory/900-5-0x0000000000180000-0x0000000000181000-memory.dmp
        Filesize

        4KB

      • memory/1960-10-0x000007FEF7020000-0x000007FEF729A000-memory.dmp
        Filesize

        2.5MB

      • memory/2008-2-0x000007FEFB891000-0x000007FEFB893000-memory.dmp
        Filesize

        8KB