General
-
Target
tmp
-
Size
444KB
-
Sample
220414-cp91kagbem
-
MD5
c6b350b0d6f8dc37c144f76a57c9dbe7
-
SHA1
e637d8a29d46281a5fa97d84af1dfe1d72223157
-
SHA256
6348bded936831629494c1d820fe8e3dbe3fb4d9f96940bbb4ca0c1872bef0ad
-
SHA512
5220ff154b731a8a1d1e768552fee037cacb12412eff931384c105d4caa5483da64c11b4839ab44885214d4d8831b280687b54b2438f89a230fce68bf7692dff
Static task
static1
Behavioral task
behavioral1
Sample
tmp.dll
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
tmp.dll
Resource
win10v2004-20220310-en
Malware Config
Extracted
zloader
26/03
https://vfgthujbxd.xyz/milagrecf.php
https://todiks.xyz/milagrecf.php
-
build_id
108
Targets
-
-
Target
tmp
-
Size
444KB
-
MD5
c6b350b0d6f8dc37c144f76a57c9dbe7
-
SHA1
e637d8a29d46281a5fa97d84af1dfe1d72223157
-
SHA256
6348bded936831629494c1d820fe8e3dbe3fb4d9f96940bbb4ca0c1872bef0ad
-
SHA512
5220ff154b731a8a1d1e768552fee037cacb12412eff931384c105d4caa5483da64c11b4839ab44885214d4d8831b280687b54b2438f89a230fce68bf7692dff
Score10/10-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-