General

  • Target

    02cb5c5e7e3c2ab21849927122d00aff871db962752410a303728394fd39f607

  • Size

    2.2MB

  • Sample

    240515-ws2cdach5z

  • MD5

    21f3048771aabc6dc4be59001e31b98f

  • SHA1

    a20b94a3f31817bb322c586e3cb318e51524def0

  • SHA256

    02cb5c5e7e3c2ab21849927122d00aff871db962752410a303728394fd39f607

  • SHA512

    065804a5e4fe5e44ff4b0af57c530c0fedc0f5d9ff8219a7bb9ad1d4e5afce64e437a796e09691eda393e94318813a5a4d4b2864567179814cee0f2e047b75ba

  • SSDEEP

    49152:Luu30KZbTChxKCnFnQXBbrtgb/iQvu0UHOY8:LH0KZ6hxvWbrtUTrUHOY8

Malware Config

Targets

    • Target

      02cb5c5e7e3c2ab21849927122d00aff871db962752410a303728394fd39f607

    • Size

      2.2MB

    • MD5

      21f3048771aabc6dc4be59001e31b98f

    • SHA1

      a20b94a3f31817bb322c586e3cb318e51524def0

    • SHA256

      02cb5c5e7e3c2ab21849927122d00aff871db962752410a303728394fd39f607

    • SHA512

      065804a5e4fe5e44ff4b0af57c530c0fedc0f5d9ff8219a7bb9ad1d4e5afce64e437a796e09691eda393e94318813a5a4d4b2864567179814cee0f2e047b75ba

    • SSDEEP

      49152:Luu30KZbTChxKCnFnQXBbrtgb/iQvu0UHOY8:LH0KZ6hxvWbrtUTrUHOY8

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • UPX dump on OEP (original entry point)

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Winlogon Helper DLL

1
T1547.004

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Winlogon Helper DLL

1
T1547.004

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Modify Registry

4
T1112

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks