General

  • Target

    TeraBox_1.9.0.4.exe

  • Size

    78.6MB

  • Sample

    220915-ahjhxsfdal

  • MD5

    1393dbe54a40e55d128120de408f8ddb

  • SHA1

    1748cd612bb30fdee3f7a340fa49b2b6298ca265

  • SHA256

    009053dc6722ff482a3945853b43f8536bcdf87e90c537f586c4410a6eef73be

  • SHA512

    81f8238fc6248f2ccf8a92fc3144e5b890d3d7b0747d085a002201c2c3fb12713608a69858864b919315315c8b7e4da4868d5da678bd1c2e7e51116059e52b78

  • SSDEEP

    1572864:q0j1sTb8vY/e5RIzdgZ7eGNsRXZEJE2PAdkOlXCi1z31D:qA1sTF/ev/GNiEqAdkOlV1L1D

Malware Config

Targets

    • Target

      TeraBox_1.9.0.4.exe

    • Size

      78.6MB

    • MD5

      1393dbe54a40e55d128120de408f8ddb

    • SHA1

      1748cd612bb30fdee3f7a340fa49b2b6298ca265

    • SHA256

      009053dc6722ff482a3945853b43f8536bcdf87e90c537f586c4410a6eef73be

    • SHA512

      81f8238fc6248f2ccf8a92fc3144e5b890d3d7b0747d085a002201c2c3fb12713608a69858864b919315315c8b7e4da4868d5da678bd1c2e7e51116059e52b78

    • SSDEEP

      1572864:q0j1sTb8vY/e5RIzdgZ7eGNsRXZEJE2PAdkOlXCi1z31D:qA1sTF/ev/GNiEqAdkOlV1L1D

    • Modifies system executable filetype association

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Executes dropped EXE

    • Registers COM server for autorun

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks