General

  • Target

    SecuriteInfo.com.C64.YzY0Ovy4hELZZb0e.10477

  • Size

    579KB

  • Sample

    200630-vfpsp3vvne

  • MD5

    8c803e59b00506c97d382a0d628f35b5

  • SHA1

    9550d3d3e18164d09fb962845b7bf8054eecc620

  • SHA256

    b7a306bd407cca438202bfb3b92abff60f959418c7fd129487a6510554ff5706

  • SHA512

    0a06b98c25fc65c12f45823aa5edd0ed8f637f70c35f40cddc9925760b13db064bb2c1ab1ba9857c6e6efbb5e5208f6b13f7aa7a64ec28e1edf3f2530b86938f

Malware Config

Targets

    • Target

      SecuriteInfo.com.C64.YzY0Ovy4hELZZb0e.10477

    • Size

      579KB

    • MD5

      8c803e59b00506c97d382a0d628f35b5

    • SHA1

      9550d3d3e18164d09fb962845b7bf8054eecc620

    • SHA256

      b7a306bd407cca438202bfb3b92abff60f959418c7fd129487a6510554ff5706

    • SHA512

      0a06b98c25fc65c12f45823aa5edd0ed8f637f70c35f40cddc9925760b13db064bb2c1ab1ba9857c6e6efbb5e5208f6b13f7aa7a64ec28e1edf3f2530b86938f

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Blacklisted process makes network request

    • Modifies system certificate store

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks