Analysis
-
max time kernel
131s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19-04-2022 04:06
Static task
static1
Behavioral task
behavioral1
Sample
795268d44a8c63129e72dcc0a832bfd20526745c5dc3bfda17eacbd19acc85b8.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
795268d44a8c63129e72dcc0a832bfd20526745c5dc3bfda17eacbd19acc85b8.dll
-
Size
277KB
-
MD5
483dba96a462faa4a9023caa518b0ee4
-
SHA1
cafb62e91fd58cf4b6d3b5a5bcd41cf89165cc32
-
SHA256
795268d44a8c63129e72dcc0a832bfd20526745c5dc3bfda17eacbd19acc85b8
-
SHA512
a20ffd1ad4eef318528efdbc54042fc250ac67e5b59540e916ec6abd902cad0673d055223cb54fea2a35a6db5063381720f0325c5adb7a93df3d9f8f9c55e220
Malware Config
Extracted
Family
zloader
Botnet
nut
Campaign
30/10
C2
https://creditoacumuladoicms.com.br/npnegt.php
https://morgadoent.co.za/fp3jsl.php
https://access-one.us/clkgmw.php
https://amazonuniverse.in/dgxcee.php
https://ntandingsundhosmala.tk/wp-smarts.php
Attributes
-
build_id
188
rc4.plain
rsa_pubkey.plain
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4720 wrote to memory of 2508 4720 rundll32.exe 79 PID 4720 wrote to memory of 2508 4720 rundll32.exe 79 PID 4720 wrote to memory of 2508 4720 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\795268d44a8c63129e72dcc0a832bfd20526745c5dc3bfda17eacbd19acc85b8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\795268d44a8c63129e72dcc0a832bfd20526745c5dc3bfda17eacbd19acc85b8.dll,#12⤵PID:2508
-