General

  • Target

    zloader 2_1.1.19.0.vir

  • Size

    280KB

  • Sample

    200719-scqhlzv4cx

  • MD5

    06cbf262293eb6689ce5d2e61c494f7a

  • SHA1

    46ddf35b6ad2596d0fc666701fac599bc1f7b534

  • SHA256

    ec9668cae1c65020021d2c633b68286944f1e6b1ddf5183d40ef823607e29cba

  • SHA512

    375bf59d11e89955315deb1b2d36d16776dbbde2c5cab5ca2fe0d5f049aa30bac00643222a200126eb9a93a5e66e13b8ec39e29c2abbc356db8d301f1bb0768a

Malware Config

Extracted

Family

zloader

Botnet

10/03

Campaign

https://dhteijwrb.host/milagrecf.php

C2

https://aquolepp.pw/milagrecf.php

rc4.plain

Targets

    • Target

      zloader 2_1.1.19.0.vir

    • Size

      280KB

    • MD5

      06cbf262293eb6689ce5d2e61c494f7a

    • SHA1

      46ddf35b6ad2596d0fc666701fac599bc1f7b534

    • SHA256

      ec9668cae1c65020021d2c633b68286944f1e6b1ddf5183d40ef823607e29cba

    • SHA512

      375bf59d11e89955315deb1b2d36d16776dbbde2c5cab5ca2fe0d5f049aa30bac00643222a200126eb9a93a5e66e13b8ec39e29c2abbc356db8d301f1bb0768a

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks