General
-
Target
af62641d0be903ea60f9e26caf913f886b21460f7ccacab2df809e6de0a72dbf
-
Size
454KB
-
Sample
220201-e5ekpsgfgj
-
MD5
6a996ad9b92e21065fa2e482281eaa58
-
SHA1
2c058d0ffd86f97a666e84a24e5be373128ab1d1
-
SHA256
af62641d0be903ea60f9e26caf913f886b21460f7ccacab2df809e6de0a72dbf
-
SHA512
ca7c4eb14f41f156af235472d86951ef8deea2c2329452fa89a1a3928482c73aa81664c4862ec4c9b5486ab803d69d67a1e6d7ef5975e9f45cb5c20059f48b95
Behavioral task
behavioral1
Sample
af62641d0be903ea60f9e26caf913f886b21460f7ccacab2df809e6de0a72dbf.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
af62641d0be903ea60f9e26caf913f886b21460f7ccacab2df809e6de0a72dbf.dll
Resource
win10v2004-en-20220113
Malware Config
Extracted
zloader
Mar31
Canada
http://march262020.best/post.php
http://march262020.club/post.php
http://march262020.com/post.php
http://march262020.live/post.php
http://march262020.network/post.php
http://march262020.online/post.php
http://march262020.site/post.php
http://march262020.store/post.php
http://march262020.tech/post.php
-
build_id
87
Targets
-
-
Target
af62641d0be903ea60f9e26caf913f886b21460f7ccacab2df809e6de0a72dbf
-
Size
454KB
-
MD5
6a996ad9b92e21065fa2e482281eaa58
-
SHA1
2c058d0ffd86f97a666e84a24e5be373128ab1d1
-
SHA256
af62641d0be903ea60f9e26caf913f886b21460f7ccacab2df809e6de0a72dbf
-
SHA512
ca7c4eb14f41f156af235472d86951ef8deea2c2329452fa89a1a3928482c73aa81664c4862ec4c9b5486ab803d69d67a1e6d7ef5975e9f45cb5c20059f48b95
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
Blocklisted process makes network request
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-