General

  • Target

    168af6b70609e45a8be1891659d23c70154e940a6fd7f9daf6f8e9bd5192c0c7

  • Size

    131KB

  • Sample

    211111-n5d4lsgchr

  • MD5

    28f10a71b6f73e66131efd2278c0b830

  • SHA1

    c7a863d1df81c4995a3ad3f5ec339b1079923fd5

  • SHA256

    168af6b70609e45a8be1891659d23c70154e940a6fd7f9daf6f8e9bd5192c0c7

  • SHA512

    19d66cb8af5852b88ea4f238aea7128733cebde01eb5176c792387359387298d8158642add3fd418cd5ac5e366257bac425c3a36d0ba85efcb3b7b52f139e5be

Malware Config

Extracted

Family

zloader

Botnet

buldog

Campaign

buldog

C2

https://iqowijsdakm.com/gate.php

https://wiewjdmkfjn.com/gate.php

https://dksaoidiakjd.com/gate.php

https://iweuiqjdakjd.com/gate.php

https://yuidskadjna.com/gate.php

https://olksmadnbdj.com/gate.php

https://odsakmdfnbs.com/gate.php

https://odsakjmdnhsaj.com/gate.php

https://odjdnhsaj.com/gate.php

https://odoishsaj.com/gate.php

Attributes
  • build_id

    157

rc4.plain
rsa_pubkey.plain

Targets

    • Target

      168af6b70609e45a8be1891659d23c70154e940a6fd7f9daf6f8e9bd5192c0c7

    • Size

      131KB

    • MD5

      28f10a71b6f73e66131efd2278c0b830

    • SHA1

      c7a863d1df81c4995a3ad3f5ec339b1079923fd5

    • SHA256

      168af6b70609e45a8be1891659d23c70154e940a6fd7f9daf6f8e9bd5192c0c7

    • SHA512

      19d66cb8af5852b88ea4f238aea7128733cebde01eb5176c792387359387298d8158642add3fd418cd5ac5e366257bac425c3a36d0ba85efcb3b7b52f139e5be

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • suricata: ET MALWARE Observed ZLoader CnC Domain in SNI

      suricata: ET MALWARE Observed ZLoader CnC Domain in SNI

MITRE ATT&CK Matrix

Tasks