General
-
Target
66f49a261b6086dfdd1c3e2a21f7cb746aa35707490cbd64693d66383ba54c64
-
Size
128KB
-
Sample
221027-hclebsbcgl
-
MD5
33d2581d7d36acde729ce52c5d106d79
-
SHA1
48b9cbe0f6922d6c844ab7b7122bc0cd389bf711
-
SHA256
66f49a261b6086dfdd1c3e2a21f7cb746aa35707490cbd64693d66383ba54c64
-
SHA512
75acc63cb9c38c0dd3d1759c93f38fc41e62b8853146267b6d80c7b979cf9bf281d3bd44519f1f6a9085d161a4a3d5abc5c71702c914382645e55af3fd6c8770
-
SSDEEP
3072:f9r5C53D8cD2blVIevrYc/vdDwfYX8D5/x6tT8Wfgpwylb:ft5C53D8ckM6sDW5g6yl
Behavioral task
behavioral1
Sample
66f49a261b6086dfdd1c3e2a21f7cb746aa35707490cbd64693d66383ba54c64.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
66f49a261b6086dfdd1c3e2a21f7cb746aa35707490cbd64693d66383ba54c64.dll
Resource
win10v2004-20220812-en
Malware Config
Extracted
zloader
04/02
https://brewaz.club/milagrecf.php
https://buhjike.host/milagrecf.php
-
build_id
49
Targets
-
-
Target
66f49a261b6086dfdd1c3e2a21f7cb746aa35707490cbd64693d66383ba54c64
-
Size
128KB
-
MD5
33d2581d7d36acde729ce52c5d106d79
-
SHA1
48b9cbe0f6922d6c844ab7b7122bc0cd389bf711
-
SHA256
66f49a261b6086dfdd1c3e2a21f7cb746aa35707490cbd64693d66383ba54c64
-
SHA512
75acc63cb9c38c0dd3d1759c93f38fc41e62b8853146267b6d80c7b979cf9bf281d3bd44519f1f6a9085d161a4a3d5abc5c71702c914382645e55af3fd6c8770
-
SSDEEP
3072:f9r5C53D8cD2blVIevrYc/vdDwfYX8D5/x6tT8Wfgpwylb:ft5C53D8ckM6sDW5g6yl
Score10/10-
Blocklisted process makes network request
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-