MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 deac9f705c6ddd2795f31b9d55ace3f3de1e20de314b0c20f1a2e90fdf259cb2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ZLoader


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: deac9f705c6ddd2795f31b9d55ace3f3de1e20de314b0c20f1a2e90fdf259cb2
SHA3-384 hash: d9c6407aad985ed11f3b3eba395b8642886ed6f835851be05daff6a0bdcd2708467a4529f2fe83b936480ac59dd68898
SHA1 hash: 0c53b71e52a382f2a920df2d80048b01616c62c4
MD5 hash: 93c0cd9a47c5c28335e773c1f451f200
humanhash: green-arkansas-item-idaho
File name:yfuvqe.dll
Download: download sample
Signature ZLoader
File size:398'336 bytes
First seen:2020-08-12 18:02:13 UTC
Last seen:2020-08-12 18:51:30 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash eec5ef169ae679a23648b4ebd5ff48c6 (1 x ZLoader)
ssdeep 6144:YqoPAIMMRa7OmHOQrzEGf7QaODWZlBSYIFBavsaxPODT:RoPA0eu64Gf72DGlBho8ED
Threatray 81 similar samples on MalwareBazaar
TLSH EF84B010AB91C038F1BA11F5757A87AC6A3C3EB08B7484CFA2D266EE15356F4AD30757
Reporter malware_traffic
Tags:dll Silent_Night ZLoader


Avatar
malware_traffic
Run method: regsvr32.exe /s [filename]

Intelligence


File Origin
# of uploads :
2
# of downloads :
84
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
(
)
.
a
b
c
D
e
f
g
h
I
k
l
m
n
o
r
S
t
u
w
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 264200 Sample: yfuvqe.dll Startdate: 13/08/2020 Architecture: WINDOWS Score: 48 31 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->31 9 loaddll32.exe 1 2->9         started        process3 process4 11 cmd.exe 1 9->11         started        13 regsvr32.exe 9->13         started        process5 15 iexplore.exe 14 83 11->15         started        dnsIp6 29 192.168.2.1 unknown unknown 15->29 18 iexplore.exe 5 151 15->18         started        process7 dnsIp8 23 pagead.l.doubleclick.net 172.217.168.66, 443, 49768, 49769 GOOGLEUS United States 18->23 25 id.rlcdn.com 35.244.245.222, 443, 49766, 49767 GOOGLEUS United States 18->25 27 17 other IPs or domains 18->27 21 ssvagent.exe 501 18->21         started        process9
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-08-12 18:04:07 UTC
AV detection:
18 of 29 (62.07%)
Threat level:
  5/5
Result
Malware family:
zloader
Score:
  10/10
Tags:
trojan botnet family:zloader
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Suspicious use of NtCreateUserProcessOtherParentProcess
Zloader, Terdot, DELoader, ZeusSphinx
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments