MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3bf8fbdad095013493d1b90f5c82880dc57145dfbb54fdf225ded88ba6b1618b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ZLoader


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 3bf8fbdad095013493d1b90f5c82880dc57145dfbb54fdf225ded88ba6b1618b
SHA3-384 hash: 6b10961969a6b2452034374f9b52b58f802f994c0106e98a7ddbb0942150f301ba7f3058d98cd1952b41092bccd1f4a4
SHA1 hash: cb466d91a60f1a9fdcea54cd265562cf139a48ee
MD5 hash: 37952c2ae6b0dda5efa44196bc338cf1
humanhash: montana-pip-solar-golf
File name:Zloader Dll
Download: download sample
Signature ZLoader
File size:443'904 bytes
First seen:2020-07-07 06:38:26 UTC
Last seen:2020-07-07 08:20:37 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 3ba5dd5c0057c3e61e8cd6064bd82e70 (2 x ZLoader)
ssdeep 12288:PF97AxDkxDguUv2YqefbQzLcvBw1Ux1lXU1lOFo7t:+cDIvvqqQzDWXUvxt
Threatray 128 similar samples on MalwareBazaar
TLSH 6F94C1223FD2C475F2AF5F3E8829C571891CBD895A3C58EB12E2A647177718381B8E17
Reporter JAMESWT_WT
Tags:ZLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
84
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Threat name:
Win32.Downloader.ZLoader
Status:
Malicious
First seen:
2020-07-07 06:40:05 UTC
File Type:
PE (Dll)
AV detection:
20 of 29 (68.97%)
Threat level:
  3/5
Result
Malware family:
zloader
Score:
  10/10
Tags:
trojan botnet family:zloader evasion spyware
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetThreadContext
Modifies system certificate store
Blacklisted process makes network request
Zloader, Terdot, DELoader, ZeusSphinx
Suspicious use of NtCreateUserProcessOtherParentProcess
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments