General

  • Target

    97179aa99e2c4d95d226268057774f5431b0763497b7000fe683c91a70a61071.zip

  • Size

    84KB

  • Sample

    240905-jpdqpaxakg

  • MD5

    05160192ad6e4bcbc45927fff9e0a25b

  • SHA1

    67a7b4e0693973ca35082df4f7e92746d48ad7ff

  • SHA256

    4692872bb45ad2bc1057e6794529b346d4a520d9a3d40d075dacb8ddaf722f68

  • SHA512

    2cedbe33f0230221d4219d049165dff5f84e7914ac97f2ee5166b111b3dd443736010f859b78685121f41012a96cae9a6cd2b9d64ec1f401f0cbef1cc323bd8a

  • SSDEEP

    1536:5BiLg2ecTIToZAiMBb3PM++6Xnlic9DKfRdRwhELXmjJdacZW/KCbXLmwLi7:5BiDecUTvieb3PM/6XnlpD0z7IrZ2iws

Malware Config

Extracted

Family

zloader

Botnet

r1

Campaign

r1

C2

https://notsweets.net/LKhwojehDgwegSDG/gateJKjdsh.php

https://olpons.com/LKhwojehDgwegSDG/gateJKjdsh.php

https://karamelliar.org/LKhwojehDgwegSDG/gateJKjdsh.php

https://dogrunn.com/LKhwojehDgwegSDG/gateJKjdsh.php

https://azoraz.net/LKhwojehDgwegSDG/gateJKjdsh.php

Attributes
  • build_id

    125

rc4.plain
rsa_pubkey.plain

Targets

    • Target

      97179aa99e2c4d95d226268057774f5431b0763497b7000fe683c91a70a61071.exe

    • Size

      141KB

    • MD5

      4414a7af27f8a26b48af7f3dd4259b40

    • SHA1

      67f733252b3973d6b33594f6e9f6e107597ae23d

    • SHA256

      97179aa99e2c4d95d226268057774f5431b0763497b7000fe683c91a70a61071

    • SHA512

      f96bdefa6bd34f179a4d30a576f4bcb3c2d8368f12970d55850e16e3a1fe1f1cecd29cb3af7ae88d2f56cca74ae82fae2784ed6f41f18dc54b832191b312300e

    • SSDEEP

      3072:OBq4SK7XybZIgipEGHwWVz/wQ+KFTRHrJUOBWokCs4:OBcgXy1TiuBuqKnHmOTs4

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks