General
-
Target
dbeba2fb33aaba42768a5ed8055cc8ca4009ad1921319f90c78b78d4f0dd9f7b
-
Size
489KB
-
Sample
220520-3l56bacaer
-
MD5
8c293fe05b3af514723a1639810c06a3
-
SHA1
ac2f7668c7f3049930b52a83585ac479145cd059
-
SHA256
dbeba2fb33aaba42768a5ed8055cc8ca4009ad1921319f90c78b78d4f0dd9f7b
-
SHA512
2f8db26e93c54b08944a4080e55595f348090086f849fe427f6f07b17a8a57926b1e0d6481356feb0846af0c01ffbb06122750974d3f80e2ea3c465aab1acc23
Static task
static1
Behavioral task
behavioral1
Sample
dbeba2fb33aaba42768a5ed8055cc8ca4009ad1921319f90c78b78d4f0dd9f7b.dll
Resource
win7-20220414-en
Malware Config
Extracted
zloader
bot5
bot5
https://militanttra.at/owg.php
-
build_id
15
Targets
-
-
Target
dbeba2fb33aaba42768a5ed8055cc8ca4009ad1921319f90c78b78d4f0dd9f7b
-
Size
489KB
-
MD5
8c293fe05b3af514723a1639810c06a3
-
SHA1
ac2f7668c7f3049930b52a83585ac479145cd059
-
SHA256
dbeba2fb33aaba42768a5ed8055cc8ca4009ad1921319f90c78b78d4f0dd9f7b
-
SHA512
2f8db26e93c54b08944a4080e55595f348090086f849fe427f6f07b17a8a57926b1e0d6481356feb0846af0c01ffbb06122750974d3f80e2ea3c465aab1acc23
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-