From hxxp://213.186.33.4/3n72h
Attachments
Password:infected
(144.23 KiB) Downloaded 83 times
(144.23 KiB) Downloaded 83 times
@xorsthingsv2
A forum for reverse engineering, OS internals and malware analysis
xors wrote:Not sure if they changed anything but i found the following sample on hybrid analysis.Yep it's different, hollowing process there. BTW should be Locky affid=3, maybe for this.
https://www.hybrid-analysis.com/sample/ ... mentId=100
The unpacking process and the execution of the malware is not the same ( compared to the latest campaigns, Also it doesn't need any arguments to run).
https://malwr.com/analysis/MGZkYTg0OTI4 ... NjNjMwNTY/ (the unpacked)
{
"delay": 42,
"installPersistence": false,
"fakeSvchost": false,
"seed": 9577,
"campaignId": 3,
"urlPath": "/upload/_dispatch.php",
"ignoreRussian": true,
"ips": [
"51.255.172.55",
"146.120.110.130"
]
}