General
-
Target
3707ad9488f65a2425dc524d7a496e4458410d31b576348487993272505018f5
-
Size
1.1MB
-
Sample
220205-vfb2aaddh3
-
MD5
88cb1b3a2c58a40c6ecbd2897465337d
-
SHA1
2e866fde78317929b59ed9cf63806116b38a0602
-
SHA256
3707ad9488f65a2425dc524d7a496e4458410d31b576348487993272505018f5
-
SHA512
08450aaefbe3cce898ac8c6dcb5b065b773fdd2b0f66a630711b85d5510f8553f8d19fa6e634d42a6508deb46c10162b2ed74fd3a433f727799a56bbe4cc1bbc
Static task
static1
Behavioral task
behavioral1
Sample
3707ad9488f65a2425dc524d7a496e4458410d31b576348487993272505018f5.vbs
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
3707ad9488f65a2425dc524d7a496e4458410d31b576348487993272505018f5.vbs
Resource
win10v2004-en-20220113
Malware Config
Extracted
zloader
main
01.04.2020
https://postgringos.com/sound.php
https://tetraslims.com/sound.php
https://starterdatas.com/sound.php
https://nexycombats.com/sound.php
https://hibsurf.com/sound.php
https://buhismus.com/sound.php
https://spensores.com/sound.php
https://zonaa.org/sound.php
https://smoash.org/sound.php
-
build_id
31
Targets
-
-
Target
3707ad9488f65a2425dc524d7a496e4458410d31b576348487993272505018f5
-
Size
1.1MB
-
MD5
88cb1b3a2c58a40c6ecbd2897465337d
-
SHA1
2e866fde78317929b59ed9cf63806116b38a0602
-
SHA256
3707ad9488f65a2425dc524d7a496e4458410d31b576348487993272505018f5
-
SHA512
08450aaefbe3cce898ac8c6dcb5b065b773fdd2b0f66a630711b85d5510f8553f8d19fa6e634d42a6508deb46c10162b2ed74fd3a433f727799a56bbe4cc1bbc
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-