Analysis

  • max time kernel
    80s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    06-12-2021 23:14

General

  • Target

    5192df66d6e6bec165322efcb90687347ded916bceb835c95e3191e735029984.dll

  • Size

    642KB

  • MD5

    5708cab401d3a2dbca16c57d40659a5c

  • SHA1

    f366e16d4c556e698f2b35c5b64123069d2b6af1

  • SHA256

    5192df66d6e6bec165322efcb90687347ded916bceb835c95e3191e735029984

  • SHA512

    01687a1aba85533a34a56e88a77b4140699c7dfa9e559cb4e5924db2d414d0f762fed84cc842c740234894fdfd2966c406fcd9e7ef7788dc0927f604fa6230aa

Malware Config

Extracted

Family

zloader

Botnet

googleaktualizacija

Campaign

googleaktualizacija1

C2

https://iqowijsdakm.ru/gate.php

https://wiewjdmkfjn.ru/gate.php

https://dksaoidiakjd.su/gate.php

https://iweuiqjdakjd.su/gate.php

https://yuidskadjna.su/gate.php

https://olksmadnbdj.su/gate.php

https://odsakmdfnbs.com/gate.php

https://odsakjmdnhsaj.com/gate.php

https://odjdnhsaj.com/gate.php

https://odoishsaj.com/gate.php

Attributes
  • build_id

    155

rc4.plain
rsa_pubkey.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5192df66d6e6bec165322efcb90687347ded916bceb835c95e3191e735029984.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3196
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\5192df66d6e6bec165322efcb90687347ded916bceb835c95e3191e735029984.dll,#1
      2⤵
        PID:3516
        • C:\Windows\SysWOW64\msiexec.exe
          msiexec.exe
          3⤵
            PID:2616

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2616-121-0x0000000003290000-0x00000000032B6000-memory.dmp

        Filesize

        152KB

      • memory/2616-122-0x0000000000000000-mapping.dmp

      • memory/2616-123-0x0000000002FA0000-0x0000000002FA1000-memory.dmp

        Filesize

        4KB

      • memory/2616-124-0x0000000002FA0000-0x0000000002FA1000-memory.dmp

        Filesize

        4KB

      • memory/2616-125-0x0000000003290000-0x00000000032B6000-memory.dmp

        Filesize

        152KB

      • memory/3516-118-0x0000000000000000-mapping.dmp

      • memory/3516-120-0x0000000000900000-0x0000000000926000-memory.dmp

        Filesize

        152KB

      • memory/3516-119-0x0000000000710000-0x000000000085A000-memory.dmp

        Filesize

        1.3MB