General

  • Target

    bd5bee906d87632d7f2ee9417e295e27b8a188d8c709d9eeeccca57c906c6cc9

  • Size

    255KB

  • Sample

    220512-ntz7psdah3

  • MD5

    d131c83e02079eb401b06efa61f24f64

  • SHA1

    c287863877b16a7fc3298dedb45f2cb0b0e206b7

  • SHA256

    bd5bee906d87632d7f2ee9417e295e27b8a188d8c709d9eeeccca57c906c6cc9

  • SHA512

    50846a00c57d7c162c6c1ec989f556b20562318556af7d29cdb57064be2a084a0350de06c041749be734d077b956c94ae1ccffa084d5f32279f6575102fcbca6

Malware Config

Extracted

Family

zloader

Botnet

CanadaLoads

Campaign

Nerino

C2

https://rrspmlsd1.com/bFnF0y1r/7QKpXmV3Pz.php

https://reservationsffrec.com/bFnF0y1r/7QKpXmV3Pz.php

https://tempmailsin112.com/bFnF0y1r/7QKpXmV3Pz.php

https://roadonroadonroad.com/bFnF0y1r/7QKpXmV3Pz.php

https://roadtocaliss.com/bFnF0y1r/7QKpXmV3Pz.php

https://referrer222.com/bFnF0y1r/7QKpXmV3Pz.php

https://makeitrainfordee.com/bFnF0y1r/7QKpXmV3Pz.php

https://makeitrainforffeer.com/bFnF0y1r/7QKpXmV3Pz.php

Attributes
  • build_id

    66

rc4.plain
rsa_pubkey.plain

Targets

    • Target

      bd5bee906d87632d7f2ee9417e295e27b8a188d8c709d9eeeccca57c906c6cc9

    • Size

      255KB

    • MD5

      d131c83e02079eb401b06efa61f24f64

    • SHA1

      c287863877b16a7fc3298dedb45f2cb0b0e206b7

    • SHA256

      bd5bee906d87632d7f2ee9417e295e27b8a188d8c709d9eeeccca57c906c6cc9

    • SHA512

      50846a00c57d7c162c6c1ec989f556b20562318556af7d29cdb57064be2a084a0350de06c041749be734d077b956c94ae1ccffa084d5f32279f6575102fcbca6

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • suricata: ET MALWARE Zbot POST Request to C2

      suricata: ET MALWARE Zbot POST Request to C2

    • Blocklisted process makes network request

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks