General

  • Target

    3992728a29b6991c4341f4a8f6d0698d

  • Size

    267KB

  • Sample

    231231-rmtm5achcp

  • MD5

    3992728a29b6991c4341f4a8f6d0698d

  • SHA1

    dd788e840b02507528ea95c2f13141588f4b72aa

  • SHA256

    c3afe21ba96b4e5e4fd170562a03af06f892ef87ad8d67b1b0915df5d37703ab

  • SHA512

    5f14f376cb09d338eb47a49ea257b72e13dc99a597c3ab32f22c057282ae950441cef9c2299582ec7c66ed72015cc0a8278131880fd65d1524ba7f15fea2e159

  • SSDEEP

    6144:jHoERtD/B88Xk4xjYfpxK+hawVT82+y8W4uLpByyT:joQtTHinZZR+yTVLGI

Malware Config

Extracted

Family

zloader

Botnet

tim

Campaign

tim

C2

https://iqowijsdakm.com/gate.php

https://wiewjdmkfjn.com/gate.php

https://dksaoidiakjd.com/gate.php

https://iweuiqjdakjd.com/gate.php

https://yuidskadjna.com/gate.php

https://olksmadnbdj.com/gate.php

https://odsakmdfnbs.com/gate.php

https://odsakjmdnhsaj.com/gate.php

https://odjdnhsaj.com/gate.php

https://odoishsaj.com/gate.php

Attributes
  • build_id

    157

rc4.plain
rsa_pubkey.plain

Targets

    • Target

      3992728a29b6991c4341f4a8f6d0698d

    • Size

      267KB

    • MD5

      3992728a29b6991c4341f4a8f6d0698d

    • SHA1

      dd788e840b02507528ea95c2f13141588f4b72aa

    • SHA256

      c3afe21ba96b4e5e4fd170562a03af06f892ef87ad8d67b1b0915df5d37703ab

    • SHA512

      5f14f376cb09d338eb47a49ea257b72e13dc99a597c3ab32f22c057282ae950441cef9c2299582ec7c66ed72015cc0a8278131880fd65d1524ba7f15fea2e159

    • SSDEEP

      6144:jHoERtD/B88Xk4xjYfpxK+hawVT82+y8W4uLpByyT:joQtTHinZZR+yTVLGI

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks