General
-
Target
1be04e51510b2aafb51598838b97124a73952c46b17d3d1c38254dd6d94e82a7
-
Size
274KB
-
Sample
220201-mw3j6sdfd6
-
MD5
11abbd1cd5e968e03b053426b33e64e1
-
SHA1
7e1bc02b6bc16d4df3f532c8e8498f898ed0acb6
-
SHA256
1be04e51510b2aafb51598838b97124a73952c46b17d3d1c38254dd6d94e82a7
-
SHA512
36ef0aa604b36e0e2cdeaded3f4e0593a63747ee80ea114a6ad771d3744c2f56a840148d9b47e7710689d08c8e7f7ffed6d318c99c68b26dcffef8b595e22bc8
Static task
static1
Behavioral task
behavioral1
Sample
1be04e51510b2aafb51598838b97124a73952c46b17d3d1c38254dd6d94e82a7.dll
Resource
win7-en-20211208
Malware Config
Extracted
zloader
banking
banking
https://iloveyoubaby1.pro/gate.php
https://idsakjfsanfaskj.com/gate.php
https://fslakdasjdnsasjsj.com/gate.php
https://dksadjsahnfaskmsa.com/gate.php
https://dskdsajdsahda.info/gate.php
https://dskdsajdsadasda.info/gate.php
https://dskjdsadhsahjsas.info/gate.php
https://dsjadjsadjsadjafsa.info/gate.php
https://fsakjdsafasifkajfaf.pro/gate.php
https://djsadhsadsadjashs.pro/gate.php
-
build_id
3
Targets
-
-
Target
1be04e51510b2aafb51598838b97124a73952c46b17d3d1c38254dd6d94e82a7
-
Size
274KB
-
MD5
11abbd1cd5e968e03b053426b33e64e1
-
SHA1
7e1bc02b6bc16d4df3f532c8e8498f898ed0acb6
-
SHA256
1be04e51510b2aafb51598838b97124a73952c46b17d3d1c38254dd6d94e82a7
-
SHA512
36ef0aa604b36e0e2cdeaded3f4e0593a63747ee80ea114a6ad771d3744c2f56a840148d9b47e7710689d08c8e7f7ffed6d318c99c68b26dcffef8b595e22bc8
-
Blocklisted process makes network request
-
Sets service image path in registry
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-