MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5bbdd845eeb4c298a4edd8f578f4a832086559391ccb2e6e8b50b8c3c10b7fec. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ZLoader


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 5bbdd845eeb4c298a4edd8f578f4a832086559391ccb2e6e8b50b8c3c10b7fec
SHA3-384 hash: 55a9eb17e16511a9a8e93ff701d12c4cb2241ed68166becfd936c98cf0d0b56aa3ff897338e90379cd3f56f12b89a15c
SHA1 hash: 17f72d2754aac0545cc17e9c0df02207992c5a25
MD5 hash: b153dc3944b6ce544479fd416fbee3f6
humanhash: lithium-king-nevada-wolfram
File name:ijp1
Download: download sample
Signature ZLoader
File size:494'592 bytes
First seen:2020-07-01 13:08:07 UTC
Last seen:2020-07-01 14:16:57 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 3557ba91f384305b69b2bc24cf61dc34 (2 x ZLoader)
ssdeep 12288:Ma5a4LLsVPBlcw1BCY8dGDAHtb3+Wa+k:MarX4PMw1B/kHtb3A+k
Threatray 128 similar samples on MalwareBazaar
TLSH F9B4BF213BE28035F2BF473A69768A318D6DBC8185349DCB67D2654F063B1C2D269F1B
Reporter JAMESWT_WT

Intelligence


File Origin
# of uploads :
2
# of downloads :
79
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.ZLoader
Status:
Malicious
First seen:
2020-07-01 13:10:05 UTC
File Type:
PE (Dll)
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
zloader
Score:
  10/10
Tags:
trojan botnet family:zloader evasion spyware
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetThreadContext
Modifies system certificate store
Blacklisted process makes network request
Zloader, Terdot, DELoader, ZeusSphinx
Suspicious use of NtCreateUserProcessOtherParentProcess
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments