General

  • Target

    SecuriteInfo.com.Win32.Kryptik.HENB.25036

  • Size

    579KB

  • Sample

    200630-mpqlf5s3ka

  • MD5

    08dac5157102790bb1c6d3a65660db37

  • SHA1

    e48fc7a827613aa62fde4c38d239704bfb6d8b95

  • SHA256

    455c21fbac342659cd4b5cc162772117cce60f6b59f04dba0dd4327868a428eb

  • SHA512

    a006c26cdd8da705cbadc9f9837efe4c4feed5ba8dbf5348520a3e66c2c56ab5842c74bdae7ad1cc255a4be0f763325301784190d26bcd7691e43f9f7b2e19de

Malware Config

Targets

    • Target

      SecuriteInfo.com.Win32.Kryptik.HENB.25036

    • Size

      579KB

    • MD5

      08dac5157102790bb1c6d3a65660db37

    • SHA1

      e48fc7a827613aa62fde4c38d239704bfb6d8b95

    • SHA256

      455c21fbac342659cd4b5cc162772117cce60f6b59f04dba0dd4327868a428eb

    • SHA512

      a006c26cdd8da705cbadc9f9837efe4c4feed5ba8dbf5348520a3e66c2c56ab5842c74bdae7ad1cc255a4be0f763325301784190d26bcd7691e43f9f7b2e19de

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Blacklisted process makes network request

    • Modifies system certificate store

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks