General

  • Target

    fe6778684fe56f143efd0bfae3e127f0c615f11d47e302e68a9eb1f83f7a6511

  • Size

    939KB

  • Sample

    220201-cvyvgsfceq

  • MD5

    00a2dd02c0173b91704855771eab9096

  • SHA1

    2b1fe5a12b28bb953e5481f01945e629e741d64f

  • SHA256

    fe6778684fe56f143efd0bfae3e127f0c615f11d47e302e68a9eb1f83f7a6511

  • SHA512

    4898037aa9a2c5b326ece783a9760001014f196b08100cabaf524a36f0cc8b588f8f1eefca0ce2dbadf35837904fa3b20c93109d4c7afd62509b8be0e555d795

Malware Config

Extracted

Family

zloader

Botnet

main

Campaign

15.03.2020

C2

https://postxer.com/sound.php

https://banssa.org/sound.php

https://calul.org/sound.php

https://evahs.org/sound.php

https://invesund.org/sound.php

https://unwer.org/sound.php

https://watae.org/sound.php

Attributes
  • build_id

    23

rc4.plain

Targets

    • Target

      fe6778684fe56f143efd0bfae3e127f0c615f11d47e302e68a9eb1f83f7a6511

    • Size

      939KB

    • MD5

      00a2dd02c0173b91704855771eab9096

    • SHA1

      2b1fe5a12b28bb953e5481f01945e629e741d64f

    • SHA256

      fe6778684fe56f143efd0bfae3e127f0c615f11d47e302e68a9eb1f83f7a6511

    • SHA512

      4898037aa9a2c5b326ece783a9760001014f196b08100cabaf524a36f0cc8b588f8f1eefca0ce2dbadf35837904fa3b20c93109d4c7afd62509b8be0e555d795

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Sets service image path in registry

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Tasks