General

  • Target

    55e122310b7893eb83b7b2e6077413fb60816ba0e4dee01f7f249b3a2f64a2da

  • Size

    561KB

  • Sample

    220205-szp15sdafr

  • MD5

    17fed343bada88dfbfd827cc684f5d5f

  • SHA1

    447dbb81663cb057352ddbb4770c08ed80827c0c

  • SHA256

    55e122310b7893eb83b7b2e6077413fb60816ba0e4dee01f7f249b3a2f64a2da

  • SHA512

    d945c600b529c6308c5cba950d18ea63ff349c5f21b15151214578a6eb7bc34f1bd703c418e369ba5d2a08fd9e38d1abb67f74ea3cf15fec5b5b1553276f0e55

Malware Config

Extracted

Family

zloader

Botnet

08/04

C2

https://kuaxbdkvbbmivbxkrrev.com/wp-config.php

https://hwbblyyrb.pw/wp-config.php

Attributes
  • build_id

    134

rc4.plain

Targets

    • Target

      55e122310b7893eb83b7b2e6077413fb60816ba0e4dee01f7f249b3a2f64a2da

    • Size

      561KB

    • MD5

      17fed343bada88dfbfd827cc684f5d5f

    • SHA1

      447dbb81663cb057352ddbb4770c08ed80827c0c

    • SHA256

      55e122310b7893eb83b7b2e6077413fb60816ba0e4dee01f7f249b3a2f64a2da

    • SHA512

      d945c600b529c6308c5cba950d18ea63ff349c5f21b15151214578a6eb7bc34f1bd703c418e369ba5d2a08fd9e38d1abb67f74ea3cf15fec5b5b1553276f0e55

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks