General
-
Target
zloader 2_1.0.6.0.vir
-
Size
141KB
-
Sample
231116-y8gzsage5v
-
MD5
a74a0a84a2ed0674e540ac9aa4405638
-
SHA1
6ea4c0b33b660908b6032252c345c1936364390e
-
SHA256
58afcdc59220bd54561c650d1c9f1ebed87e517dc747dfc7d243bd19708b7222
-
SHA512
a7dc0515208a02ebaec31b39c74bcf366ea2deaac7f7bbbe2b748273c53868144dec8e129f909a8b5d46c0598db384581977f51a42b2b19fb1da15d62699262c
-
SSDEEP
3072:Ze6xD8emYCB6K8WfJnIFwWmVteLz+isF:ZeqfmXFXW8wzc
Behavioral task
behavioral1
Sample
zloader 2_1.0.6.0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
zloader 2_1.0.6.0.exe
Resource
win10-20231020-en
Malware Config
Extracted
zloader
-test2
web7-test2
https://45.72.3.132/web7643/gate.php
-
build_id
929195383
Targets
-
-
Target
zloader 2_1.0.6.0.vir
-
Size
141KB
-
MD5
a74a0a84a2ed0674e540ac9aa4405638
-
SHA1
6ea4c0b33b660908b6032252c345c1936364390e
-
SHA256
58afcdc59220bd54561c650d1c9f1ebed87e517dc747dfc7d243bd19708b7222
-
SHA512
a7dc0515208a02ebaec31b39c74bcf366ea2deaac7f7bbbe2b748273c53868144dec8e129f909a8b5d46c0598db384581977f51a42b2b19fb1da15d62699262c
-
SSDEEP
3072:Ze6xD8emYCB6K8WfJnIFwWmVteLz+isF:ZeqfmXFXW8wzc
Score10/10-
Adds Run key to start application
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-