General

  • Target

    1a428412d3273adae489011beee943b12fbb069b6e22015bf7849b722696a29a.zip

  • Size

    1.3MB

  • Sample

    230928-sw8n3scd81

  • MD5

    bb4c4b04e48469c41642fccc94e64c24

  • SHA1

    b6795b35d33786f06e9e202d182cf1a5cae0ec7e

  • SHA256

    6ea43bea362695fdd8455719e14286f12811e9d5581ac062a135acf469490007

  • SHA512

    4bdd8605d09aaa605b5717eba9c2809fe511a48e57f567edba341001432557c22c0a865e873066c69ab376d6c3fd30138305c957032fffaa4767c40f4ed5cdf0

  • SSDEEP

    24576:mDRagjDbPMS9nWxLA6OLI4zhyqo87uJMgKNaVZClV2JEn8TmdCAQBgK:oPMSVGA6S5g+7uOPNaVmV2Jy8TmEJd

Malware Config

Targets

    • Target

      1a428412d3273adae489011beee943b12fbb069b6e22015bf7849b722696a29a.zip

    • Size

      1.3MB

    • MD5

      bb4c4b04e48469c41642fccc94e64c24

    • SHA1

      b6795b35d33786f06e9e202d182cf1a5cae0ec7e

    • SHA256

      6ea43bea362695fdd8455719e14286f12811e9d5581ac062a135acf469490007

    • SHA512

      4bdd8605d09aaa605b5717eba9c2809fe511a48e57f567edba341001432557c22c0a865e873066c69ab376d6c3fd30138305c957032fffaa4767c40f4ed5cdf0

    • SSDEEP

      24576:mDRagjDbPMS9nWxLA6OLI4zhyqo87uJMgKNaVZClV2JEn8TmdCAQBgK:oPMSVGA6S5g+7uOPNaVmV2Jy8TmEJd

    Score
    1/10
    • Target

      3.4.2_34024.exe

    • Size

      1.4MB

    • MD5

      608bcdfd89dc6d80c7f20de0cfc02ba7

    • SHA1

      8475d332bb64efc5fc3f45634ffe25272b8797e1

    • SHA256

      1a428412d3273adae489011beee943b12fbb069b6e22015bf7849b722696a29a

    • SHA512

      1ec4a7b7f0a55ceeb6e1bae3ffef3390b5b5827358d60d2fe6c6ecc4463c5f86f392c6bb7a4c72e99c7709480fac9c4d8eeb28ef524df2d578f5de4e90130409

    • SSDEEP

      24576:1Uv18lc6PJkDSJ0mTI03pAcLA1UqS5Kjkx1LG9JRhPkaq/JL:1U98lc6aDfm5/yUNfxIRh8aqh

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks