General
-
Target
079084e7c1bf1718ae6b10b285da7ed27cb4a48203846b60cecfbec502b666be
-
Size
476KB
-
Sample
211213-kxvvlseedm
-
MD5
cc00b3639732518c892f67f5e662c134
-
SHA1
d8ef7b39e9263ee7118ecf427a793cf8909b2e70
-
SHA256
079084e7c1bf1718ae6b10b285da7ed27cb4a48203846b60cecfbec502b666be
-
SHA512
c6b0cf40120fb3d0cacba51209e219317f18e62d342913ef644ca21ec574424869760378e944f2db5891b3b3d637d7f4a6118cea7756ae3daaa18a04e7e7b91f
Static task
static1
Behavioral task
behavioral1
Sample
079084e7c1bf1718ae6b10b285da7ed27cb4a48203846b60cecfbec502b666be.dll
Resource
win7-en-20211208
Malware Config
Extracted
zloader
Jho
25/03
https://wgyvjbse.pw/milagrecf.php
https://botiq.xyz/milagrecf.php
-
build_id
106
Targets
-
-
Target
079084e7c1bf1718ae6b10b285da7ed27cb4a48203846b60cecfbec502b666be
-
Size
476KB
-
MD5
cc00b3639732518c892f67f5e662c134
-
SHA1
d8ef7b39e9263ee7118ecf427a793cf8909b2e70
-
SHA256
079084e7c1bf1718ae6b10b285da7ed27cb4a48203846b60cecfbec502b666be
-
SHA512
c6b0cf40120fb3d0cacba51209e219317f18e62d342913ef644ca21ec574424869760378e944f2db5891b3b3d637d7f4a6118cea7756ae3daaa18a04e7e7b91f
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-