General

  • Target

    161dabd778b2d24a7cae425bc2349e3db840acf49222c6067359ec7a01d3e05e

  • Size

    258KB

  • Sample

    220201-myk3xadfe8

  • MD5

    b57d728b9b71593edb74984985412ebd

  • SHA1

    71394a1e2056ab7938d00d65ea4e74fb92178630

  • SHA256

    161dabd778b2d24a7cae425bc2349e3db840acf49222c6067359ec7a01d3e05e

  • SHA512

    c277df221bbd76884468d499c0a9fdff8443efd2e2540f56678f6d8831e315c27d3f51d6129344652daffa215a6f4e63915f7665bbe487a5a1f4dfbd3bcb26a4

Malware Config

Extracted

Family

zloader

Botnet

banking

Campaign

banking

C2

https://iloveyoubaby1.pro/gate.php

https://idsakjfsanfaskj.com/gate.php

https://fslakdasjdnsasjsj.com/gate.php

https://dksadjsahnfaskmsa.com/gate.php

https://dskdsajdsahda.info/gate.php

https://dskdsajdsadasda.info/gate.php

https://dskjdsadhsahjsas.info/gate.php

https://dsjadjsadjsadjafsa.info/gate.php

https://fsakjdsafasifkajfaf.pro/gate.php

https://djsadhsadsadjashs.pro/gate.php

Attributes
  • build_id

    2

rc4.plain

Targets

    • Target

      161dabd778b2d24a7cae425bc2349e3db840acf49222c6067359ec7a01d3e05e

    • Size

      258KB

    • MD5

      b57d728b9b71593edb74984985412ebd

    • SHA1

      71394a1e2056ab7938d00d65ea4e74fb92178630

    • SHA256

      161dabd778b2d24a7cae425bc2349e3db840acf49222c6067359ec7a01d3e05e

    • SHA512

      c277df221bbd76884468d499c0a9fdff8443efd2e2540f56678f6d8831e315c27d3f51d6129344652daffa215a6f4e63915f7665bbe487a5a1f4dfbd3bcb26a4

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Blocklisted process makes network request

    • Sets service image path in registry

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks