General

  • Target

    0-02-0a-ab608ce4619c10c5d404f16bc3f3a3e1a39bcad96df6f2ffe440a46a09b7a566_d59198ec.mp4

  • Size

    9.0MB

  • Sample

    230403-yt9fgsaf7w

  • MD5

    2011df51a30664ddf718843763d9d418

  • SHA1

    d8e74638ef0cac0b417c3e5870d27e1679ed2c75

  • SHA256

    f5b3db14850a6a7622acb969eb356953a038d0547a2f96d1d5400f7e765eaecb

  • SHA512

    125d40319b1d06e9d92cf67696bd6f7c0d60fc626198f01791b1f928b6f8055adfa4c5df2c87539ada4e9157be6abc389e01b8a1446bc90510535f56ebfe2003

  • SSDEEP

    196608:swV7flhfeTswLYNX9b5TguVq075HIl3oG1n+2KWBAAZRmjOeP:9vlzkYTbiP0RWz1n+2KWBAAZRaOe

Malware Config

Targets

    • Target

      0-02-0a-ab608ce4619c10c5d404f16bc3f3a3e1a39bcad96df6f2ffe440a46a09b7a566_d59198ec.mp4

    • Size

      9.0MB

    • MD5

      2011df51a30664ddf718843763d9d418

    • SHA1

      d8e74638ef0cac0b417c3e5870d27e1679ed2c75

    • SHA256

      f5b3db14850a6a7622acb969eb356953a038d0547a2f96d1d5400f7e765eaecb

    • SHA512

      125d40319b1d06e9d92cf67696bd6f7c0d60fc626198f01791b1f928b6f8055adfa4c5df2c87539ada4e9157be6abc389e01b8a1446bc90510535f56ebfe2003

    • SSDEEP

      196608:swV7flhfeTswLYNX9b5TguVq075HIl3oG1n+2KWBAAZRmjOeP:9vlzkYTbiP0RWz1n+2KWBAAZRaOe

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v6

Tasks