General

  • Target

    5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b

  • Size

    186KB

  • Sample

    220503-r79j3scbam

  • MD5

    1a4775088c588d35892b94a21753f311

  • SHA1

    244f880cc3880a7676590ba6b78c542acbcd73d0

  • SHA256

    5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b

  • SHA512

    330f97c6616c5b9c19e23118c398d6b29c23d21f35984a59943483b896873b16b090f2ccfe6718e2d4d3b45a2a5e5c9b3177bf545a4b028c0e138181a0f01c74

Malware Config

Extracted

Family

zloader

Botnet

CanadaLoads

Campaign

Nerino

C2

https://makemoneywithforexxs.com/bFnF0y1r/7QKpXmV3Pz.php

https://monanuslanus.com/bFnF0y1r/7QKpXmV3Pz.php

https://lericastrongs.com/bFnF0y1r/7QKpXmV3Pz.php

https://hyllionsudks.com/bFnF0y1r/7QKpXmV3Pz.php

https://crimewasddef.com/bFnF0y1r/7QKpXmV3Pz.php

https://derekdsingel.com/bFnF0y1r/7QKpXmV3Pz.php

https://simplereffiret.com/bFnF0y1r/7QKpXmV3Pz.php

https://regeerscomba.com/bFnF0y1r/7QKpXmV3Pz.php

Attributes
  • build_id

    73

rc4.plain
rsa_pubkey.plain

Targets

    • Target

      5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b

    • Size

      186KB

    • MD5

      1a4775088c588d35892b94a21753f311

    • SHA1

      244f880cc3880a7676590ba6b78c542acbcd73d0

    • SHA256

      5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b

    • SHA512

      330f97c6616c5b9c19e23118c398d6b29c23d21f35984a59943483b896873b16b090f2ccfe6718e2d4d3b45a2a5e5c9b3177bf545a4b028c0e138181a0f01c74

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • suricata: ET MALWARE Zbot POST Request to C2

      suricata: ET MALWARE Zbot POST Request to C2

    • Blocklisted process makes network request

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks