General
-
Target
5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b
-
Size
186KB
-
Sample
220503-r79j3scbam
-
MD5
1a4775088c588d35892b94a21753f311
-
SHA1
244f880cc3880a7676590ba6b78c542acbcd73d0
-
SHA256
5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b
-
SHA512
330f97c6616c5b9c19e23118c398d6b29c23d21f35984a59943483b896873b16b090f2ccfe6718e2d4d3b45a2a5e5c9b3177bf545a4b028c0e138181a0f01c74
Static task
static1
Behavioral task
behavioral1
Sample
5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
zloader
CanadaLoads
Nerino
https://makemoneywithforexxs.com/bFnF0y1r/7QKpXmV3Pz.php
https://monanuslanus.com/bFnF0y1r/7QKpXmV3Pz.php
https://lericastrongs.com/bFnF0y1r/7QKpXmV3Pz.php
https://hyllionsudks.com/bFnF0y1r/7QKpXmV3Pz.php
https://crimewasddef.com/bFnF0y1r/7QKpXmV3Pz.php
https://derekdsingel.com/bFnF0y1r/7QKpXmV3Pz.php
https://simplereffiret.com/bFnF0y1r/7QKpXmV3Pz.php
https://regeerscomba.com/bFnF0y1r/7QKpXmV3Pz.php
-
build_id
73
Targets
-
-
Target
5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b
-
Size
186KB
-
MD5
1a4775088c588d35892b94a21753f311
-
SHA1
244f880cc3880a7676590ba6b78c542acbcd73d0
-
SHA256
5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b
-
SHA512
330f97c6616c5b9c19e23118c398d6b29c23d21f35984a59943483b896873b16b090f2ccfe6718e2d4d3b45a2a5e5c9b3177bf545a4b028c0e138181a0f01c74
-
Blocklisted process makes network request
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-