General

  • Target

    zloader_1_0_2_0

  • Size

    338KB

  • Sample

    211004-2jpvwahcgm

  • MD5

    62d565051f3cae6d6bc8971420bec819

  • SHA1

    b6c0f532108a3b392e9d8c1b0cfbf85cf8aa8fb3

  • SHA256

    f1bdd2bcbaf40bb99224fa293edc1581fd124da63c035657918877901d79bed8

  • SHA512

    c1401aeb4788ff39a501529ab3cd55223570404657be98c137326d76f7a23e5bf6dbb1faefd609519819c509ffcfd4d47f06c09afacad460485fbda9eb87d9ff

Malware Config

Targets

    • Target

      zloader_1_0_2_0

    • Size

      338KB

    • MD5

      62d565051f3cae6d6bc8971420bec819

    • SHA1

      b6c0f532108a3b392e9d8c1b0cfbf85cf8aa8fb3

    • SHA256

      f1bdd2bcbaf40bb99224fa293edc1581fd124da63c035657918877901d79bed8

    • SHA512

      c1401aeb4788ff39a501529ab3cd55223570404657be98c137326d76f7a23e5bf6dbb1faefd609519819c509ffcfd4d47f06c09afacad460485fbda9eb87d9ff

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks