Resubmissions

10-08-2023 17:12

230810-vq913aff23 10

10-08-2023 16:29

230810-tznnragg4y 10

09-11-2020 20:57

201109-4wpwk1zk1e 10

General

  • Target

    zte(1).dll

  • Size

    473KB

  • Sample

    230810-vq913aff23

  • MD5

    2b99305fdd451f60f935efb4fd4fb9be

  • SHA1

    d0c7f705d3d94ccea33654f940c7b2e77448fc3d

  • SHA256

    8761a16b210e215456f4ad4dffeb624ee2b2b3646971860dc5ffb0f8b82658b0

  • SHA512

    7fb8307f9a669fd1ba37a41d4f611d61124370b514fa290fd0d9ad1dcba8f2c0a37e3999ee507944f03d66ac3907ba56bf3fbaaef5409e5ae5e7746f6d7bca0f

  • SSDEEP

    12288:T2s615320KPnJHFlswhjmoUYtIdySZYBk:TZ8V98jmotI2S

Malware Config

Extracted

Family

zloader

Botnet

bot5

Campaign

bot5

C2

https://militanttra.at/owg.php

Attributes
  • build_id

    15

rc4.plain
rsa_pubkey.plain

Targets

    • Target

      zte(1).dll

    • Size

      473KB

    • MD5

      2b99305fdd451f60f935efb4fd4fb9be

    • SHA1

      d0c7f705d3d94ccea33654f940c7b2e77448fc3d

    • SHA256

      8761a16b210e215456f4ad4dffeb624ee2b2b3646971860dc5ffb0f8b82658b0

    • SHA512

      7fb8307f9a669fd1ba37a41d4f611d61124370b514fa290fd0d9ad1dcba8f2c0a37e3999ee507944f03d66ac3907ba56bf3fbaaef5409e5ae5e7746f6d7bca0f

    • SSDEEP

      12288:T2s615320KPnJHFlswhjmoUYtIdySZYBk:TZ8V98jmotI2S

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks