Analysis
-
max time kernel
74s -
max time network
135s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
14-04-2021 07:23
Static task
static1
Behavioral task
behavioral1
Sample
2SoXN.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
2SoXN.dll
-
Size
666KB
-
MD5
dac52df1477fe8b567b656c1da2e876f
-
SHA1
4b020a24c3d68b21b586a531e04d558f04de4f52
-
SHA256
314ac0158727ba0bed95d244200e569e5aa9528f4c567c1c2c5cfba542fe545c
-
SHA512
fb36eb6c6327b8e51cb5230ab5206b2fb327ff440d3e9219535b75b39bd6d03871be7069960120238072a2b0c29ba5716ba8868d02a1fc85b0a62445454cc240
Malware Config
Extracted
Family
zloader
Botnet
nut
Campaign
13/04
C2
https://jiaayanu.com/post.php
https://investinszeklerland.eu/post.php
https://iqs-sac.com/post.php
https://jciems.in/post.php
https://jinnahofficersschool.com/post.php
https://kancagh.com/post.php
rc4.plain
rsa_pubkey.plain
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4656 wrote to memory of 4744 4656 rundll32.exe rundll32.exe PID 4656 wrote to memory of 4744 4656 rundll32.exe rundll32.exe PID 4656 wrote to memory of 4744 4656 rundll32.exe rundll32.exe