General
-
Target
bbbc1a46aa7998a12dc9b13c29b5204b784669e60d8bb1d05fbf2741abf68342
-
Size
847KB
-
Sample
220201-etv4bahba7
-
MD5
4fc69f56dfa547aea675fdaa51141cc2
-
SHA1
ad3b5825bacb4768e7724b81cc5048cae16c9688
-
SHA256
bbbc1a46aa7998a12dc9b13c29b5204b784669e60d8bb1d05fbf2741abf68342
-
SHA512
791b37b80711be0eebc702efaf08445b256a6b768ce94314f693ee1dafe93ad9c756d1ad116be429d933b8cf2cfd3c72dc5c4a597d47b61ef664b5dd1edf432b
Static task
static1
Behavioral task
behavioral1
Sample
bbbc1a46aa7998a12dc9b13c29b5204b784669e60d8bb1d05fbf2741abf68342.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
bbbc1a46aa7998a12dc9b13c29b5204b784669e60d8bb1d05fbf2741abf68342.dll
Resource
win10v2004-en-20220112
Malware Config
Extracted
zloader
main
18.03.2020
https://postxer.com/sound.php
https://sentspiels.com/sound.php
https://watae.org/sound.php
https://eirry.org/sound.php
https://lotio.org/sound.php
-
build_id
24
Targets
-
-
Target
bbbc1a46aa7998a12dc9b13c29b5204b784669e60d8bb1d05fbf2741abf68342
-
Size
847KB
-
MD5
4fc69f56dfa547aea675fdaa51141cc2
-
SHA1
ad3b5825bacb4768e7724b81cc5048cae16c9688
-
SHA256
bbbc1a46aa7998a12dc9b13c29b5204b784669e60d8bb1d05fbf2741abf68342
-
SHA512
791b37b80711be0eebc702efaf08445b256a6b768ce94314f693ee1dafe93ad9c756d1ad116be429d933b8cf2cfd3c72dc5c4a597d47b61ef664b5dd1edf432b
Score10/10-
Sets service image path in registry
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-