General

  • Target

    baf5a4d8895b91205e8e83f4899546031020b8be5ef1adb543a5289a8baa6568

  • Size

    375KB

  • Sample

    220201-evnqmahbb8

  • MD5

    07138aec070b27a80e7ae1fe273c05a2

  • SHA1

    e119d237fe730112fef7c8d8ee36d06e083d150c

  • SHA256

    baf5a4d8895b91205e8e83f4899546031020b8be5ef1adb543a5289a8baa6568

  • SHA512

    f73f1c14e2ae1a10ac2c7d4f5ce8f19c5cf8590f50754e0685591e99aa732f8e92b6d22ecc68bb615e4259bfa66afda0f02762e7b8b0b8d8a678f948922cb20a

Malware Config

Extracted

Family

zloader

Botnet

CASPAM

Campaign

CASPAM

C2

http://marchadvertisingnetwork4.com/post.php

http://marchadvertisingnetwork5.com/post.php

http://marchadvertisingnetwork6.com/post.php

http://marchadvertisingnetwork7.com/post.php

http://marchadvertisingnetwork8.com/post.php

http://marchadvertisingnetwork9.com/post.php

http://marchadvertisingnetwork10.com/post.php

Attributes
  • build_id

    24

rc4.plain

Targets

    • Target

      baf5a4d8895b91205e8e83f4899546031020b8be5ef1adb543a5289a8baa6568

    • Size

      375KB

    • MD5

      07138aec070b27a80e7ae1fe273c05a2

    • SHA1

      e119d237fe730112fef7c8d8ee36d06e083d150c

    • SHA256

      baf5a4d8895b91205e8e83f4899546031020b8be5ef1adb543a5289a8baa6568

    • SHA512

      f73f1c14e2ae1a10ac2c7d4f5ce8f19c5cf8590f50754e0685591e99aa732f8e92b6d22ecc68bb615e4259bfa66afda0f02762e7b8b0b8d8a678f948922cb20a

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Blocklisted process makes network request

    • Sets service image path in registry

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks