General
-
Target
af6af9c2d50e7c692521dac219b7f2f23c6b677216267dcbaf44bd44f7290d70
-
Size
830KB
-
Sample
220201-e5cfcagffr
-
MD5
05df30ff372ff1d27ab4874b50565c8f
-
SHA1
e5e16ba4f24fd939e6ece581704ac6ca9df4b0d6
-
SHA256
af6af9c2d50e7c692521dac219b7f2f23c6b677216267dcbaf44bd44f7290d70
-
SHA512
ff152d5327fe7c3abeed6f74c3f5173de8bb228b6207036d9bc086eaeb164781118b6eb2fbae648ad06c59f862c902b8735099d63022dd661f6e5183631b97f8
Static task
static1
Behavioral task
behavioral1
Sample
af6af9c2d50e7c692521dac219b7f2f23c6b677216267dcbaf44bd44f7290d70.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
af6af9c2d50e7c692521dac219b7f2f23c6b677216267dcbaf44bd44f7290d70.dll
Resource
win10v2004-en-20220112
Malware Config
Extracted
zloader
main
23.03.2020
https://hustlertest.com/sound.php
https://dandycodes.com/sound.php
https://sandyfotos.com/sound.php
-
build_id
26
Targets
-
-
Target
af6af9c2d50e7c692521dac219b7f2f23c6b677216267dcbaf44bd44f7290d70
-
Size
830KB
-
MD5
05df30ff372ff1d27ab4874b50565c8f
-
SHA1
e5e16ba4f24fd939e6ece581704ac6ca9df4b0d6
-
SHA256
af6af9c2d50e7c692521dac219b7f2f23c6b677216267dcbaf44bd44f7290d70
-
SHA512
ff152d5327fe7c3abeed6f74c3f5173de8bb228b6207036d9bc086eaeb164781118b6eb2fbae648ad06c59f862c902b8735099d63022dd661f6e5183631b97f8
Score10/10-
Sets service image path in registry
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-