General

  • Target

    8_DustJacket-Recovered-Recovered-Recovered.psd

  • Size

    5.7MB

  • Sample

    240202-qvkjraheer

  • MD5

    50240fcc43ac5027a106dd5a534a3bd7

  • SHA1

    48a7c3bd255109173e4ae8efa836c090ba3cc898

  • SHA256

    15fe683d10c7a1588958f885106a4775546555fa813eda4e42e35e6b65b27c86

  • SHA512

    f6fd93fcdecdc6b349933d0d2a4fdfe3e77cbef08b0332b116c6d4ca1ef7429a9fd3e02a62c3d61c64451da975e6888b618becd491437fca630fd1b4a1fa1f3e

  • SSDEEP

    98304:8PVAII5ooAhgmkUU0hq2Sh5JYvc3nDqvVZfH7sTYf5KG5MJYtknX63CnWXHjOdVB:8Pb5Wm1U0hSTJY03+dZfbsTYfOJYtknT

Malware Config

Targets

    • Target

      8_DustJacket-Recovered-Recovered-Recovered.psd

    • Size

      5.7MB

    • MD5

      50240fcc43ac5027a106dd5a534a3bd7

    • SHA1

      48a7c3bd255109173e4ae8efa836c090ba3cc898

    • SHA256

      15fe683d10c7a1588958f885106a4775546555fa813eda4e42e35e6b65b27c86

    • SHA512

      f6fd93fcdecdc6b349933d0d2a4fdfe3e77cbef08b0332b116c6d4ca1ef7429a9fd3e02a62c3d61c64451da975e6888b618becd491437fca630fd1b4a1fa1f3e

    • SSDEEP

      98304:8PVAII5ooAhgmkUU0hq2Sh5JYvc3nDqvVZfH7sTYf5KG5MJYtknX63CnWXHjOdVB:8Pb5Wm1U0hSTJY03+dZfbsTYfOJYtknT

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks