General

  • Target

    511dab2388e7a98cc70a8e6abbfe3c47f170c9fc616941a2c05c08b1fc449ef1

  • Size

    372KB

  • Sample

    220921-h1ragsffe8

  • MD5

    70e58943ac83f5d6467e5e173ec66b28

  • SHA1

    ab2dd9bb32849fcb4c8be3ca8277c7e3bd89b941

  • SHA256

    511dab2388e7a98cc70a8e6abbfe3c47f170c9fc616941a2c05c08b1fc449ef1

  • SHA512

    a13926885a211f814a8c3d19f4feda64c73876c1e04e93bd2fffa6ae6e03f100ea415743e8c23810f6402ae3f8d73adb3003defbc12d409656b395c3ebc7a913

  • SSDEEP

    6144:tZ9hTPbmQmla02F8iU+7831GRHLjA8rWHzSOcwNTn:XDPb8002F8iU+43ERrjjrCnNz

Malware Config

Extracted

Family

zloader

Botnet

main

Campaign

10.02.2020

C2

https://fibulu.org/sound.php

https://tarynak.org/sound.php

Attributes
  • build_id

    6

rc4.plain

Targets

    • Target

      511dab2388e7a98cc70a8e6abbfe3c47f170c9fc616941a2c05c08b1fc449ef1

    • Size

      372KB

    • MD5

      70e58943ac83f5d6467e5e173ec66b28

    • SHA1

      ab2dd9bb32849fcb4c8be3ca8277c7e3bd89b941

    • SHA256

      511dab2388e7a98cc70a8e6abbfe3c47f170c9fc616941a2c05c08b1fc449ef1

    • SHA512

      a13926885a211f814a8c3d19f4feda64c73876c1e04e93bd2fffa6ae6e03f100ea415743e8c23810f6402ae3f8d73adb3003defbc12d409656b395c3ebc7a913

    • SSDEEP

      6144:tZ9hTPbmQmla02F8iU+7831GRHLjA8rWHzSOcwNTn:XDPb8002F8iU+43ERrjjrCnNz

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks