Resubmissions

20/04/2025, 00:10 UTC

250420-agcc8axyax 10

16/04/2025, 11:04 UTC

250416-m58gsaz1ay 10

15/04/2025, 17:34 UTC

250415-v5ylksypw9 10

15/04/2025, 06:16 UTC

250415-g1p7ras1dw 10

14/04/2025, 08:06 UTC

250414-jzpwpstxhx 10

14/04/2025, 07:59 UTC

250414-jvg1assky4 10

14/04/2025, 07:22 UTC

250414-h7g1dss1h1 10

14/04/2025, 07:16 UTC

250414-h3xv2s1nv6 10

Analysis

  • max time kernel
    433s
  • max time network
    440s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250411-en
  • resource tags

    arch:x64arch:x86image:win11-20250411-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15/04/2025, 06:16 UTC

General

  • Target

    SecuriteInfo.com.Generic.mg.cde56cf0169830ee.dll

  • Size

    486KB

  • MD5

    cde56cf0169830ee0059ee385c0c5eaf

  • SHA1

    08aacb48ffcdc6b49af18d01155982984de230f7

  • SHA256

    cb762227729d0faadc4c33a4a55b513673a9c76284773535b0e07d7e47d8413e

  • SHA512

    234ddd4191c1abdfe04d9cc1afe2fed2901ef4d38404d0568a356218bc62096d200dd8ec28c8980da4a5852b0a481bf698b244f51d13560b303285b99105b3dd

  • SSDEEP

    6144:o3uSkuqpikJJ0Zkt5GSd2OwuXz//71gJtpdY2/jF6qA6VSFzH0ZUH:vJuqIIoU5HdeuD//+3JcDqSFzz

Malware Config

Extracted

Family

zloader

Botnet

05/05

C2

https://rswtgmhf.pw/wp-config.php

https://fwgdhdln.icu/wp-config.php

Attributes
  • build_id

    181

rc4.plain
1
41997b4a729e1a0175208305170752dd

Signatures

  • Zloader family
  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Generic.mg.cde56cf0169830ee.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5232
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Generic.mg.cde56cf0169830ee.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4968

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4968-0-0x0000000000AD0000-0x0000000000AFF000-memory.dmp

    Filesize

    188KB

  • memory/4968-1-0x0000000002450000-0x0000000002483000-memory.dmp

    Filesize

    204KB

  • memory/4968-2-0x0000000000AD0000-0x0000000000AFF000-memory.dmp

    Filesize

    188KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.