General
-
Target
zloader 2_1.1.19.0.vir
-
Size
280KB
-
Sample
200719-scqhlzv4cx
-
MD5
06cbf262293eb6689ce5d2e61c494f7a
-
SHA1
46ddf35b6ad2596d0fc666701fac599bc1f7b534
-
SHA256
ec9668cae1c65020021d2c633b68286944f1e6b1ddf5183d40ef823607e29cba
-
SHA512
375bf59d11e89955315deb1b2d36d16776dbbde2c5cab5ca2fe0d5f049aa30bac00643222a200126eb9a93a5e66e13b8ec39e29c2abbc356db8d301f1bb0768a
Static task
static1
Behavioral task
behavioral1
Sample
zloader 2_1.1.19.0.vir.dll
Resource
win7v200430
Behavioral task
behavioral2
Sample
zloader 2_1.1.19.0.vir.dll
Resource
win10v200430
Malware Config
Extracted
zloader
10/03
https://dhteijwrb.host/milagrecf.php
https://aquolepp.pw/milagrecf.php
Targets
-
-
Target
zloader 2_1.1.19.0.vir
-
Size
280KB
-
MD5
06cbf262293eb6689ce5d2e61c494f7a
-
SHA1
46ddf35b6ad2596d0fc666701fac599bc1f7b534
-
SHA256
ec9668cae1c65020021d2c633b68286944f1e6b1ddf5183d40ef823607e29cba
-
SHA512
375bf59d11e89955315deb1b2d36d16776dbbde2c5cab5ca2fe0d5f049aa30bac00643222a200126eb9a93a5e66e13b8ec39e29c2abbc356db8d301f1bb0768a
Score10/10-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-