General
-
Target
e3932ab83bc05de2e91d321c4d479ff1aa3d10fdbd91e1687c80cc0ec88270e8.zip
-
Size
70KB
-
Sample
221226-qpgkxagb8t
-
MD5
1647195938228c7e5aa08ba3087f0a70
-
SHA1
3b6149a74dad462649dba9a001c04adccdfa7d85
-
SHA256
461bc141026278f75214983abeafe0ce0d9be8750ee5847e858d8e56a70eefbd
-
SHA512
dc535439f6cb7f1c169a5c6838c9be5899c2e492d18027a6d208b3af5ac150ea6afccebeb8c8656bb36a2dc8df30953b0620946450809aa64a5996f338efdb82
-
SSDEEP
1536:mBtQWdV0lCRdiDgWLLDfM5iF+5ua8noKwJzjm44ZOncLeQ:0QWdV0lQDYP0cEQaqodmX0c9
Behavioral task
behavioral1
Sample
e3932ab83bc05de2e91d321c4d479ff1aa3d10fdbd91e1687c80cc0ec88270e8.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e3932ab83bc05de2e91d321c4d479ff1aa3d10fdbd91e1687c80cc0ec88270e8.dll
Resource
win10-20220812-en
Malware Config
Extracted
zloader
DLLobnova
1017
https://fdsjfjdsfjdsjfdjsfh.com/gate.php
https://fdsjfjdsfjdsdsjajjs.com/gate.php
https://idisaudhasdhasdj.com/gate.php
https://dsjdjsjdsadhasdas.com/gate.php
https://dsdjfhdsufudhjas.com/gate.php
https://dsdjfhdsufudhjas.info/gate.php
https://fdsjfjdsfjdsdsjajjs.info/gate.php
https://idisaudhasdhasdj.info/gate.php
-
build_id
28
Targets
-
-
Target
e3932ab83bc05de2e91d321c4d479ff1aa3d10fdbd91e1687c80cc0ec88270e8
-
Size
111KB
-
MD5
e3564138588cba04c873bd054458f8b9
-
SHA1
157ec7421e1333b714d01a750b6d5d6517a92c45
-
SHA256
e3932ab83bc05de2e91d321c4d479ff1aa3d10fdbd91e1687c80cc0ec88270e8
-
SHA512
2a2e8ce45a928bcffdb40ebf6559c1f071bb3feccfd9cfe355e593acb559ecf84858cf4474708d311317ab08b3f981eba7c8b80dceae973839a0eec9049665c8
-
SSDEEP
1536:3ui/9Xb791Wff4K84oeRnobxxm2ShclQaLMin8F5vAC+WEQbAmTjTpeyv0+gPzff:H/J7jWHT/oegcaQF5XEgHbpeyvfgT
-
Blocklisted process makes network request
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-