Analysis

  • max time kernel
    47s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    07-03-2021 14:11

General

  • Target

    1254515.dll

  • Size

    843KB

  • MD5

    c247335cbbfc2f607e43773d8c1c0f4a

  • SHA1

    707ab78dab9cf2b5277e668eb1c59be42af6549f

  • SHA256

    0d1774171175d150cc859a71fc56cd6a8132c9c679d3bd5c7f065126ed2a071e

  • SHA512

    6f2c9f2647703aeef053e00b298ce10c1636f839ab5310416b57b496f98e7ffc2fca311938794138930cee95b6dc964c51c81c0570739fc040563ccb79c1412d

Malware Config

Extracted

Family

zloader

Botnet

googleaktualizacija

Campaign

googleaktualizacija2

C2

https://iqowijsdakm.com/gate.php

https://wiewjdmkfjn.com/gate.php

https://dksaoidiakjd.com/gate.php

https://iweuiqjdakjd.com/gate.php

https://yuidskadjna.com/gate.php

https://olksmadnbdj.com/gate.php

https://odsakmdfnbs.com/gate.php

https://odsakjmdnhsaj.com/gate.php

https://odjdnhsaj.com/gate.php

https://odoishsaj.com/gate.php

rc4.plain
rsa_pubkey.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\1254515.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\1254515.dll
      2⤵
        PID:1516
        • C:\Windows\SysWOW64\msiexec.exe
          msiexec.exe
          3⤵
            PID:1524

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1152-2-0x000007FEFB991000-0x000007FEFB993000-memory.dmp
        Filesize

        8KB

      • memory/1516-3-0x0000000000000000-mapping.dmp
      • memory/1516-4-0x00000000760C1000-0x00000000760C3000-memory.dmp
        Filesize

        8KB

      • memory/1516-5-0x00000000003A0000-0x00000000003A1000-memory.dmp
        Filesize

        4KB

      • memory/1516-6-0x0000000001F30000-0x000000000207B000-memory.dmp
        Filesize

        1.3MB

      • memory/1524-7-0x0000000000000000-mapping.dmp
      • memory/1524-9-0x0000000000110000-0x0000000000136000-memory.dmp
        Filesize

        152KB

      • memory/1744-10-0x000007FEF6010000-0x000007FEF628A000-memory.dmp
        Filesize

        2.5MB