General

  • Target

    c886b6a0e78106a83d4375b297fa5ef7775dd5a9f22239c998f72c6abf39ff26

  • Size

    1.1MB

  • Sample

    211206-272vcafdbr

  • MD5

    25c14298d7383424ec49374aa1635c80

  • SHA1

    f8f16e9d54406efe700d791e318eac57af91aa6f

  • SHA256

    c886b6a0e78106a83d4375b297fa5ef7775dd5a9f22239c998f72c6abf39ff26

  • SHA512

    400cc0a208731eb4e81b8ceebf241547bb5b2e1e79d8f7ece8998f6b503aad30cfde30e3f0020d381b66a2c4a68eda22bb778d0d12192a2d9159ff3fb27441ed

Malware Config

Extracted

Family

zloader

Botnet

mk1

Campaign

mac2

C2

https://adslstickerfone.world/click.php

Attributes
  • build_id

    20

rc4.plain

Targets

    • Target

      c886b6a0e78106a83d4375b297fa5ef7775dd5a9f22239c998f72c6abf39ff26

    • Size

      1.1MB

    • MD5

      25c14298d7383424ec49374aa1635c80

    • SHA1

      f8f16e9d54406efe700d791e318eac57af91aa6f

    • SHA256

      c886b6a0e78106a83d4375b297fa5ef7775dd5a9f22239c998f72c6abf39ff26

    • SHA512

      400cc0a208731eb4e81b8ceebf241547bb5b2e1e79d8f7ece8998f6b503aad30cfde30e3f0020d381b66a2c4a68eda22bb778d0d12192a2d9159ff3fb27441ed

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks