General

  • Target

    58afcdc59220bd54561c650d1c9f1ebed87e517dc747dfc7d243bd19708b7222_unpacked

  • Size

    141KB

  • Sample

    221027-hclebsbce3

  • MD5

    a74a0a84a2ed0674e540ac9aa4405638

  • SHA1

    6ea4c0b33b660908b6032252c345c1936364390e

  • SHA256

    58afcdc59220bd54561c650d1c9f1ebed87e517dc747dfc7d243bd19708b7222

  • SHA512

    a7dc0515208a02ebaec31b39c74bcf366ea2deaac7f7bbbe2b748273c53868144dec8e129f909a8b5d46c0598db384581977f51a42b2b19fb1da15d62699262c

  • SSDEEP

    3072:Ze6xD8emYCB6K8WfJnIFwWmVteLz+isF:ZeqfmXFXW8wzc

Malware Config

Extracted

Family

zloader

Botnet

-test2

Campaign

web7-test2

C2

https://45.72.3.132/web7643/gate.php

Attributes
  • build_id

    929195383

rc4.plain

Targets

    • Target

      58afcdc59220bd54561c650d1c9f1ebed87e517dc747dfc7d243bd19708b7222_unpacked

    • Size

      141KB

    • MD5

      a74a0a84a2ed0674e540ac9aa4405638

    • SHA1

      6ea4c0b33b660908b6032252c345c1936364390e

    • SHA256

      58afcdc59220bd54561c650d1c9f1ebed87e517dc747dfc7d243bd19708b7222

    • SHA512

      a7dc0515208a02ebaec31b39c74bcf366ea2deaac7f7bbbe2b748273c53868144dec8e129f909a8b5d46c0598db384581977f51a42b2b19fb1da15d62699262c

    • SSDEEP

      3072:Ze6xD8emYCB6K8WfJnIFwWmVteLz+isF:ZeqfmXFXW8wzc

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Blocklisted process makes network request

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks