General
-
Target
57c7f0bc7a487df329eb3e8b19debde9ce1821e250123227cdc2dfbdd8b1b766
-
Size
250KB
-
Sample
220201-mde16adda9
-
MD5
5970ecc1e667dbfac22baece0305655e
-
SHA1
5e0dbef986f2456081aa27b8f06430abfa3ab102
-
SHA256
57c7f0bc7a487df329eb3e8b19debde9ce1821e250123227cdc2dfbdd8b1b766
-
SHA512
fb99473005cc9fa442cea28ba46b5befd0fea8d09f1a527303e8a02036de7d535bc1cf70505c0d8223e2bbcc6e65ef9d0c54ce0161f864c5e1840f928762365d
Static task
static1
Behavioral task
behavioral1
Sample
57c7f0bc7a487df329eb3e8b19debde9ce1821e250123227cdc2dfbdd8b1b766.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
57c7f0bc7a487df329eb3e8b19debde9ce1821e250123227cdc2dfbdd8b1b766.dll
Resource
win10v2004-en-20220113
Malware Config
Extracted
zloader
DLLobnova
spamCA
https://fdsjfjdsfjdsdsjajjs.com/gate.php
https://idisaudhasdhasdj.com/gate.php
https://dsjdjsjdsadhasdas.com/gate.php
https://dsdjfhdsufudhjas.com/gate.php
https://dsdjfhdsufudhjas.info/gate.php
https://fdsjfjdsfjdsdsjajjs.info/gate.php
https://idisaudhasdhasdj.info/gate.php
https://dsdjfhdsufudhjas.pro/gate.php
https://dsdjfhd9ddksaas.pro/gate.php
-
build_id
12
Targets
-
-
Target
57c7f0bc7a487df329eb3e8b19debde9ce1821e250123227cdc2dfbdd8b1b766
-
Size
250KB
-
MD5
5970ecc1e667dbfac22baece0305655e
-
SHA1
5e0dbef986f2456081aa27b8f06430abfa3ab102
-
SHA256
57c7f0bc7a487df329eb3e8b19debde9ce1821e250123227cdc2dfbdd8b1b766
-
SHA512
fb99473005cc9fa442cea28ba46b5befd0fea8d09f1a527303e8a02036de7d535bc1cf70505c0d8223e2bbcc6e65ef9d0c54ce0161f864c5e1840f928762365d
-
Blocklisted process makes network request
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-