General
-
Target
16464a294fc276ea38e4f8aedd7fa6d1f426036d42b342bde27bdc63b5c6658c
-
Size
310KB
-
Sample
220201-myf4ysdfe6
-
MD5
b9d425b1970b5fd03aed67053d97916d
-
SHA1
6b198494ce7d94fe26e72f4d0de776c897d9231a
-
SHA256
16464a294fc276ea38e4f8aedd7fa6d1f426036d42b342bde27bdc63b5c6658c
-
SHA512
621449a17709fb703c18e84b31956a1fefd7a0204743061c401f7208a12c9a51df6f60eee0be155ca290d0336e46b7fdef8eaa4267dc8147916f43d824cb989d
Static task
static1
Behavioral task
behavioral1
Sample
16464a294fc276ea38e4f8aedd7fa6d1f426036d42b342bde27bdc63b5c6658c.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
16464a294fc276ea38e4f8aedd7fa6d1f426036d42b342bde27bdc63b5c6658c.dll
Resource
win10v2004-en-20220113
Malware Config
Extracted
zloader
banking
banking
https://iloveyoubaby1.pro/gate.php
https://idsakjfsanfaskj.com/gate.php
https://fslakdasjdnsasjsj.com/gate.php
https://dksadjsahnfaskmsa.com/gate.php
https://dskdsajdsahda.info/gate.php
https://dskdsajdsadasda.info/gate.php
https://dskjdsadhsahjsas.info/gate.php
https://dsjadjsadjsadjafsa.info/gate.php
https://fsakjdsafasifkajfaf.pro/gate.php
https://djsadhsadsadjashs.pro/gate.php
-
build_id
2
Targets
-
-
Target
16464a294fc276ea38e4f8aedd7fa6d1f426036d42b342bde27bdc63b5c6658c
-
Size
310KB
-
MD5
b9d425b1970b5fd03aed67053d97916d
-
SHA1
6b198494ce7d94fe26e72f4d0de776c897d9231a
-
SHA256
16464a294fc276ea38e4f8aedd7fa6d1f426036d42b342bde27bdc63b5c6658c
-
SHA512
621449a17709fb703c18e84b31956a1fefd7a0204743061c401f7208a12c9a51df6f60eee0be155ca290d0336e46b7fdef8eaa4267dc8147916f43d824cb989d
-
Blocklisted process makes network request
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-