General

  • Target

    TeraBox_1.12.5.8.exe

  • Size

    79.6MB

  • Sample

    221230-f5412aac7y

  • MD5

    307ecfb9554db41fd38711f3896275e9

  • SHA1

    562f88a68415dcff6ed771bce542071cf745e6d6

  • SHA256

    adfc360f409f6d91f405ee2f523a65ef53f2fab23df62627ef610bc47ca9c4fa

  • SHA512

    d5570a69103522bb2e541173a1c8ff43737d353dc76ba9ac896b6f55fc112976a8cbf7797c6924aec161b150e616d2c69df3de472664dd48e426a7d96a9cf20b

  • SSDEEP

    1572864:oJrltsdCBfCio2l2y+g3xkGcsQ492KW9tyTzIUjaOA1S1o23q2+XmFg:ylqmfYOrxVce92KCKIUj5bk2g

Malware Config

Targets

    • Target

      TeraBox_1.12.5.8.exe

    • Size

      79.6MB

    • MD5

      307ecfb9554db41fd38711f3896275e9

    • SHA1

      562f88a68415dcff6ed771bce542071cf745e6d6

    • SHA256

      adfc360f409f6d91f405ee2f523a65ef53f2fab23df62627ef610bc47ca9c4fa

    • SHA512

      d5570a69103522bb2e541173a1c8ff43737d353dc76ba9ac896b6f55fc112976a8cbf7797c6924aec161b150e616d2c69df3de472664dd48e426a7d96a9cf20b

    • SSDEEP

      1572864:oJrltsdCBfCio2l2y+g3xkGcsQ492KW9tyTzIUjaOA1S1o23q2+XmFg:ylqmfYOrxVce92KCKIUj5bk2g

    • Modifies system executable filetype association

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Executes dropped EXE

    • Registers COM server for autorun

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks