General

  • Target

    8af1f18ed86898a92c5e20d9d3abaf7a_JaffaCakes118

  • Size

    119KB

  • Sample

    240811-s4wz9awbjr

  • MD5

    8af1f18ed86898a92c5e20d9d3abaf7a

  • SHA1

    e789544575c2a0a74524ab50fc47d348af876093

  • SHA256

    bd882e2eefd0145ff169d868c1815df272f84a5ad1e501cfa5c3336839774171

  • SHA512

    ac12219195622d65790a63c405a32c0b9f38fe74e7492cb7894d934b84792e22c25ba3453cdcd7fc9e228190082b0e132bce167e0e6e4c10aeea804ac2a168c2

  • SSDEEP

    3072:7LnLvYuSYOkboKxL35ouXgkfMVtViEoW:XLYuSYIKxDwLj

Malware Config

Extracted

Family

zloader

Attributes
  • build_id

    3238765

Targets

    • Target

      8af1f18ed86898a92c5e20d9d3abaf7a_JaffaCakes118

    • Size

      119KB

    • MD5

      8af1f18ed86898a92c5e20d9d3abaf7a

    • SHA1

      e789544575c2a0a74524ab50fc47d348af876093

    • SHA256

      bd882e2eefd0145ff169d868c1815df272f84a5ad1e501cfa5c3336839774171

    • SHA512

      ac12219195622d65790a63c405a32c0b9f38fe74e7492cb7894d934b84792e22c25ba3453cdcd7fc9e228190082b0e132bce167e0e6e4c10aeea804ac2a168c2

    • SSDEEP

      3072:7LnLvYuSYOkboKxL35ouXgkfMVtViEoW:XLYuSYIKxDwLj

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks