General

  • Target

    af6af9c2d50e7c692521dac219b7f2f23c6b677216267dcbaf44bd44f7290d70

  • Size

    830KB

  • Sample

    220201-e5cfcagffr

  • MD5

    05df30ff372ff1d27ab4874b50565c8f

  • SHA1

    e5e16ba4f24fd939e6ece581704ac6ca9df4b0d6

  • SHA256

    af6af9c2d50e7c692521dac219b7f2f23c6b677216267dcbaf44bd44f7290d70

  • SHA512

    ff152d5327fe7c3abeed6f74c3f5173de8bb228b6207036d9bc086eaeb164781118b6eb2fbae648ad06c59f862c902b8735099d63022dd661f6e5183631b97f8

Malware Config

Extracted

Family

zloader

Botnet

main

Campaign

23.03.2020

C2

https://hustlertest.com/sound.php

https://dandycodes.com/sound.php

https://sandyfotos.com/sound.php

Attributes
  • build_id

    26

rc4.plain

Targets

    • Target

      af6af9c2d50e7c692521dac219b7f2f23c6b677216267dcbaf44bd44f7290d70

    • Size

      830KB

    • MD5

      05df30ff372ff1d27ab4874b50565c8f

    • SHA1

      e5e16ba4f24fd939e6ece581704ac6ca9df4b0d6

    • SHA256

      af6af9c2d50e7c692521dac219b7f2f23c6b677216267dcbaf44bd44f7290d70

    • SHA512

      ff152d5327fe7c3abeed6f74c3f5173de8bb228b6207036d9bc086eaeb164781118b6eb2fbae648ad06c59f862c902b8735099d63022dd661f6e5183631b97f8

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Sets service image path in registry

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Tasks