General

  • Target

    97179aa99e2c4d95d226268057774f5431b0763497b7000fe683c91a70a61071.zip

  • Size

    84KB

  • Sample

    250114-mx1rzaxrhl

  • MD5

    5e3f02ce971c8baf7875b0d42b4dcd97

  • SHA1

    94886339ad07327bef84afabc611e88f66d09ed3

  • SHA256

    d7b42514361773a561be25edf6c89f444f1f5bd2bb1462151e6490c94fa38581

  • SHA512

    c55c189ec943ec5c38013aab8c76603e2f502dced9cc035500d6beb64513cf95825ed07e5840b467a9103545a1c6ffb5d74f0e6bbc02c5388089e8e99f3a6ba0

  • SSDEEP

    1536:XZRbLDm59w6rrwLZNMzdeMNj2G8+iHPrcF0OA2hmMSOHn2/thfHHAAfaOLt4dwmG:p6HrwLZNywn5VPwMbOW1h/Mw46TNr

Malware Config

Extracted

Family

zloader

Botnet

r1

Campaign

r1

C2

https://notsweets.net/LKhwojehDgwegSDG/gateJKjdsh.php

https://olpons.com/LKhwojehDgwegSDG/gateJKjdsh.php

https://karamelliar.org/LKhwojehDgwegSDG/gateJKjdsh.php

https://dogrunn.com/LKhwojehDgwegSDG/gateJKjdsh.php

https://azoraz.net/LKhwojehDgwegSDG/gateJKjdsh.php

Attributes
  • build_id

    125

rc4.plain
rsa_pubkey.plain

Targets

    • Target

      97179aa99e2c4d95d226268057774f5431b0763497b7000fe683c91a70a61071.exe

    • Size

      141KB

    • MD5

      4414a7af27f8a26b48af7f3dd4259b40

    • SHA1

      67f733252b3973d6b33594f6e9f6e107597ae23d

    • SHA256

      97179aa99e2c4d95d226268057774f5431b0763497b7000fe683c91a70a61071

    • SHA512

      f96bdefa6bd34f179a4d30a576f4bcb3c2d8368f12970d55850e16e3a1fe1f1cecd29cb3af7ae88d2f56cca74ae82fae2784ed6f41f18dc54b832191b312300e

    • SSDEEP

      3072:OBq4SK7XybZIgipEGHwWVz/wQ+KFTRHrJUOBWokCs4:OBcgXy1TiuBuqKnHmOTs4

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Zloader family

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks