General

  • Target

    d7ea78ed27fd9b409d82b101317e7fc3f513efe456de24d62c13d443033e3165

  • Size

    199KB

  • Sample

    220512-cqtpzaagfk

  • MD5

    7366f05f1ae2ac01e37e0e1585471611

  • SHA1

    38fec58363128d9f2722cb0662b30c20740e9685

  • SHA256

    d7ea78ed27fd9b409d82b101317e7fc3f513efe456de24d62c13d443033e3165

  • SHA512

    8af15534ca621210adf23d22da1f859f76fb10a6857e07167f23cb53ebff39c51d0b38fa7caa26c4de76a63f066ca070f0ff30139dd46335fefd6c9ccebd71ad

Malware Config

Extracted

Family

zloader

Botnet

SG

Campaign

SG

C2

https://imagn.at/LKhwojehDgwegSDG/gateJKjdsh.php

https://freebreez.com/LKhwojehDgwegSDG/gateJKjdsh.php

https://makaronz.com/LKhwojehDgwegSDG/gateJKjdsh.php

https://ricklick.com/LKhwojehDgwegSDG/gateJKjdsh.php

https://litlblockblack.com/LKhwojehDgwegSDG/gateJKjdsh.php

https://vaktorianpackif.com/LKhwojehDgwegSDG/gateJKjdsh.php

https://hbamefphmqsdgkqojgwe.com/LKhwojehDgwegSDG/gateJKjdsh.php

https://wuktmlbilrsbvsbkdetb.com/LKhwojehDgwegSDG/gateJKjdsh.php

https://yrsfuaegsevyffrfsgpj.com/LKhwojehDgwegSDG/gateJKjdsh.php

Attributes
  • build_id

    107

rc4.plain
rsa_pubkey.plain

Targets

    • Target

      d7ea78ed27fd9b409d82b101317e7fc3f513efe456de24d62c13d443033e3165

    • Size

      199KB

    • MD5

      7366f05f1ae2ac01e37e0e1585471611

    • SHA1

      38fec58363128d9f2722cb0662b30c20740e9685

    • SHA256

      d7ea78ed27fd9b409d82b101317e7fc3f513efe456de24d62c13d443033e3165

    • SHA512

      8af15534ca621210adf23d22da1f859f76fb10a6857e07167f23cb53ebff39c51d0b38fa7caa26c4de76a63f066ca070f0ff30139dd46335fefd6c9ccebd71ad

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks