General
-
Target
a5ec2f495c117f199e1cecc1e2c9e5ad7f4f8241eb0784bb82da89c5ac88778b
-
Size
395KB
-
Sample
220524-3qdxmafgel
-
MD5
f00a09d9a91de170a986d743da8a912b
-
SHA1
797e0c4bc66a9ce9598bd99b8c30340d42de71b7
-
SHA256
a5ec2f495c117f199e1cecc1e2c9e5ad7f4f8241eb0784bb82da89c5ac88778b
-
SHA512
ac36017e3d6b61332a983e5de1f20ef137c6127f90c6102c0a033a80fb7c4838e1eeb841615afe6226c4e4dee8aee38659d4df94d41a8fe14238d092f12e91ae
Static task
static1
Behavioral task
behavioral1
Sample
a5ec2f495c117f199e1cecc1e2c9e5ad7f4f8241eb0784bb82da89c5ac88778b.dll
Resource
win7-20220414-en
Malware Config
Extracted
zloader
July20SSL
July20SSL
https://vlcafxbdjtlvlcduwhga.com/web/post.php
https://softwareserviceupdater3.com/web/post.php
https://softwareserviceupdater4.com/web/post.php
-
build_id
18
Targets
-
-
Target
a5ec2f495c117f199e1cecc1e2c9e5ad7f4f8241eb0784bb82da89c5ac88778b
-
Size
395KB
-
MD5
f00a09d9a91de170a986d743da8a912b
-
SHA1
797e0c4bc66a9ce9598bd99b8c30340d42de71b7
-
SHA256
a5ec2f495c117f199e1cecc1e2c9e5ad7f4f8241eb0784bb82da89c5ac88778b
-
SHA512
ac36017e3d6b61332a983e5de1f20ef137c6127f90c6102c0a033a80fb7c4838e1eeb841615afe6226c4e4dee8aee38659d4df94d41a8fe14238d092f12e91ae
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Suspicious use of SetThreadContext
-