MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c39c463e221a61fdbb08795fdd6f8583a52e2977bc108356c7745e64b02147f7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ZLoader


Vendor detections: 3


Intelligence 3 IOCs YARA 3 File information Comments

SHA256 hash: c39c463e221a61fdbb08795fdd6f8583a52e2977bc108356c7745e64b02147f7
SHA3-384 hash: 4d9ba0a01a8455458cab87c6369247b4eb7e3f90ef246cc790230f77019722d9eab4d1f24167a0ca7ed335d7dd68b563
SHA1 hash: 5dc323a2dc78f86e21c84be3ba8529d34b81d377
MD5 hash: 893274f952158162c74b56ce68e16435
humanhash: march-carolina-paris-oscar
File name:Rechnung_13.xls
Download: download sample
Signature ZLoader
File size:120'832 bytes
First seen:2020-04-02 17:46:32 UTC
Last seen:Never
File type:Excel file xls
MIME type:application/vnd.ms-excel
ssdeep 3072:/ZItuhdOLptwDbElVXm7VUoqHBy1R2AyY:/Z9d68DIlVW7VUoao1RIY
TLSH 58C30225E3105212F3B40A7ACA93144CDF672F26F2539D569BC9F7AD2A3BEE00353499
Reporter abuse_ch
Tags:xls ZLoader


Avatar
abuse_ch
Malspam campaign, likely sent through compromised email accounts, distributing ZLoader:

Helo: smtpauth-dc2.online.net
Sending IP: 62.210.16.40
From: TESCO (POLSKA) SP Z O O <sally@saint-bonnet.net>
Subject: TESCO - kupon rabatowy NR 55163177
Attachment: Rechnung_13.xls

ZLoader payload delivery URL:
https://eetownvulgar.xyz/3/ssf.dll

Related:
pranksduck.xyz

ZLoader C2s:
https://representis.xyz/noagate.php
https://representis.icu/noagate.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
108
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Stratos
Status:
Malicious
First seen:
2020-04-02 18:35:31 UTC
File Type:
Document
Extracted files:
3
AV detection:
11 of 31 (35.48%)
Threat level:
  2/5
Verdict:
unknown
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:SharedStrings
Author:Katie Kleemola
Description:Internal names found in LURK0/CCTV0 samples
Rule name:win_alina_pos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_gootkit_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

ZLoader

Excel file xls c39c463e221a61fdbb08795fdd6f8583a52e2977bc108356c7745e64b02147f7

(this sample)

  
Dropping
ZLoader
  
Delivery method
Distributed via e-mail attachment

Comments