MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6679da77917ddc1ab75c7f05dee0701d172ff0bfc6a7cd92d4c73a66c877a7d8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ZLoader


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 6679da77917ddc1ab75c7f05dee0701d172ff0bfc6a7cd92d4c73a66c877a7d8
SHA3-384 hash: c6284e8fa45e5e527b05f2f8e948f63969bd6ea2ab057abcc0ac31ba34502872a156a665451bc9ee335ef758bcba4edd
SHA1 hash: d1ed2bd42658512faaacbe8d8230d3b542991654
MD5 hash: 06758591f9fede42c56ee311988acc4a
humanhash: neptune-seven-floor-mobile
File name:B3.DLL
Download: download sample
Signature ZLoader
File size:580'608 bytes
First seen:2020-09-02 11:00:05 UTC
Last seen:2020-09-09 13:06:44 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash ffa8edb184bae936b92a8e82f25e2342 (1 x ZLoader)
ssdeep 6144:UXhlbaTbLY6VhaQOJz3utQQ24SKJi5+RvoNQ/JyRpYrCwZ:UXh5a7BV83utQQ24xvorRpYP
Threatray 6 similar samples on MalwareBazaar
TLSH 60C4A402F7D71F27CD9B3136845A2C77817BEE940799FA0746A9F944DAB03E93B21206
Reporter JAMESWT_WT
Tags:ZLoader

Intelligence


File Origin
# of uploads :
4
# of downloads :
96
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 281077 Sample: B3.DLL Startdate: 02/09/2020 Architecture: WINDOWS Score: 52 10 Multi AV Scanner detection for submitted file 2->10 12 Machine Learning detection for sample 2->12 6 loaddll32.exe 1 2->6         started        process3 process4 8 WerFault.exe 6 9 6->8         started       
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-09-01 22:23:13 UTC
File Type:
PE (Dll)
Extracted files:
26
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  4/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Modifies data under HKEY_USERS
Suspicious use of AdjustPrivilegeToken
Drops file in Windows directory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments