Resubmissions

17-11-2023 12:48

231117-p1y4naad9s 10

05-02-2022 13:02

220205-qaa5ksbef5 10

General

  • Target

    8d5a770975e52ce1048534372207336f6cc657b43887daa49994e63e8d7f6ce1

  • Size

    856KB

  • Sample

    220205-qaa5ksbef5

  • MD5

    306212efebc6ac92000687393e56a5cb

  • SHA1

    dc0b678e9ad7cadd5de907bf80fa351d5d3347cc

  • SHA256

    8d5a770975e52ce1048534372207336f6cc657b43887daa49994e63e8d7f6ce1

  • SHA512

    1d40714f657f4f1820da817fcc9f6dd98d2c0dec2e5e7c71fa51c1066be30bd36de967d706f021e8032bce787bc881469261cbd0224a362d93a271c0ee6381ee

Malware Config

Extracted

Family

zloader

Botnet

main

Campaign

05.04.2020

C2

https://knalc.com/sound.php

https://namilh.com/sound.php

https://ronswank.com/sound.php

https://stagolk.com/sound.php

https://mioniough.com/sound.php

https://ergensu.com/sound.php

Attributes
  • build_id

    33

rc4.plain

Targets

    • Target

      8d5a770975e52ce1048534372207336f6cc657b43887daa49994e63e8d7f6ce1

    • Size

      856KB

    • MD5

      306212efebc6ac92000687393e56a5cb

    • SHA1

      dc0b678e9ad7cadd5de907bf80fa351d5d3347cc

    • SHA256

      8d5a770975e52ce1048534372207336f6cc657b43887daa49994e63e8d7f6ce1

    • SHA512

      1d40714f657f4f1820da817fcc9f6dd98d2c0dec2e5e7c71fa51c1066be30bd36de967d706f021e8032bce787bc881469261cbd0224a362d93a271c0ee6381ee

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks