General

  • Target

    60544c6694620488b69e568b15c96b33971dd7343ba63da31f993332852871c2

  • Size

    172KB

  • Sample

    220205-sha6nacee3

  • MD5

    4a74e2d34230bbc705f39e6943c859d3

  • SHA1

    410c1c03a52dbd56e78b0487ec532e68eb1c64e4

  • SHA256

    60544c6694620488b69e568b15c96b33971dd7343ba63da31f993332852871c2

  • SHA512

    9524e6239046f2b59210a4f7fbce554d073a9f57462c74ef5a4c009c63282e87c32e2b741d772925af0b13984304a0bc9ea0defbcb44022d1db6eebc89a81bef

Malware Config

Extracted

Family

zloader

Botnet

main

Campaign

05.04.2020

C2

https://knalc.com/sound.php

https://namilh.com/sound.php

https://ronswank.com/sound.php

https://stagolk.com/sound.php

https://mioniough.com/sound.php

https://ergensu.com/sound.php

Attributes
  • build_id

    33

rc4.plain

Targets

    • Target

      60544c6694620488b69e568b15c96b33971dd7343ba63da31f993332852871c2

    • Size

      172KB

    • MD5

      4a74e2d34230bbc705f39e6943c859d3

    • SHA1

      410c1c03a52dbd56e78b0487ec532e68eb1c64e4

    • SHA256

      60544c6694620488b69e568b15c96b33971dd7343ba63da31f993332852871c2

    • SHA512

      9524e6239046f2b59210a4f7fbce554d073a9f57462c74ef5a4c009c63282e87c32e2b741d772925af0b13984304a0bc9ea0defbcb44022d1db6eebc89a81bef

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks