General

  • Target

    4b3ff2b99ed45563241abdf5079986e2e895ff7a011a2530e6ab9da20fa14954

  • Size

    260KB

  • Sample

    220201-mg9d6sddf5

  • MD5

    b45802e885542ea5f4bf5f3fe11b01cf

  • SHA1

    cb41a9cdfd28a228f6bc3c5d5f857ec4389e7ffc

  • SHA256

    4b3ff2b99ed45563241abdf5079986e2e895ff7a011a2530e6ab9da20fa14954

  • SHA512

    33a89ec1a0584dc7bcdb837915415c5cb0b7d1eb9b570ff5e624827e18c5135aa12944ff9b6c1056723de4b2280cd433cc986daedd3d1f0a373cf5b3f123c1ee

Score
10/10

Malware Config

Extracted

Family

zloader

Attributes
  • build_id

    13

Targets

    • Target

      4b3ff2b99ed45563241abdf5079986e2e895ff7a011a2530e6ab9da20fa14954

    • Size

      260KB

    • MD5

      b45802e885542ea5f4bf5f3fe11b01cf

    • SHA1

      cb41a9cdfd28a228f6bc3c5d5f857ec4389e7ffc

    • SHA256

      4b3ff2b99ed45563241abdf5079986e2e895ff7a011a2530e6ab9da20fa14954

    • SHA512

      33a89ec1a0584dc7bcdb837915415c5cb0b7d1eb9b570ff5e624827e18c5135aa12944ff9b6c1056723de4b2280cd433cc986daedd3d1f0a373cf5b3f123c1ee

    Score
    10/10
    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks