MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 00e0c18191f6300aa197b657c7596a2fc85247572d64ff3c2711b0b5707c2d13. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ZLoader


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 00e0c18191f6300aa197b657c7596a2fc85247572d64ff3c2711b0b5707c2d13
SHA3-384 hash: d3cdb30e1bb1bd66eb2f6831118ef021b570d72719ae6796d31897c86ba15149c323a172039a3042595a678411d13584
SHA1 hash: c3923ca68af7d40707ec5c57c34ba3a0148d1165
MD5 hash: 6790bafd94fadc8f1382c40ded250c42
humanhash: yellow-aspen-ack-alabama
File name:6790bafd94fadc8f1382c40ded250c42.dll
Download: download sample
Signature ZLoader
File size:1'169'920 bytes
First seen:2020-10-23 07:11:55 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 19627cb436f84a78ee209769bd6188f1 (2 x ZLoader)
ssdeep 24576:Z727PUky++IcuUpy6DV41veBDqQJyNlKOWyqc:Z727PUkyA1441veRqQJ6lK
Threatray 36 similar samples on MalwareBazaar
TLSH D045F1627686E82AC12E8638CE84ECFC66567D099F685CD730C47F0F39378654F78A19
Reporter abuse_ch
Tags:dll ZLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
94
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Creating a file in the %temp% directory
Delayed writing of the file
Delayed reading of the file
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
A
b
c
d
e
f
i
l
M
n
o
r
S
t
u
V
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 303067 Sample: TBE2MhKCOM.dll Startdate: 23/10/2020 Architecture: WINDOWS Score: 48 12 Multi AV Scanner detection for submitted file 2->12 6 loaddll32.exe 1 2->6         started        process3 process4 8 rundll32.exe 6->8         started        10 rundll32.exe 1 6->10         started       
Threat name:
Win32.Trojan.Zeus
Status:
Malicious
First seen:
2020-10-22 14:40:46 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
zloader
Score:
  10/10
Tags:
trojan botnet family:zloader
Behaviour
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetThreadContext
Blacklisted process makes network request
Zloader, Terdot, DELoader, ZeusSphinx
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
http://wingtonwelbemdon.com/web/post.php
http://donburitimesofindia.com/web/post.php
http://celtictimesofkarishan.com/web/post.php
http://welcometothehotelsoflifes.com/web/post.php
http://wheredidtheelllcctoncsgo.com/web/post.php
http://myworld2002020999.com/web/post.php
Unpacked files
SH256 hash:
00e0c18191f6300aa197b657c7596a2fc85247572d64ff3c2711b0b5707c2d13
MD5 hash:
6790bafd94fadc8f1382c40ded250c42
SHA1 hash:
c3923ca68af7d40707ec5c57c34ba3a0148d1165
SH256 hash:
7db772d6d9909cb3b4f5fcf0572ddebd72de3e191a83babb9d5a66bb9eb640a2
MD5 hash:
6e543c620d7e80431daec41c8d510dfb
SHA1 hash:
c4f0238e3630564ad1fce84414e4ea18d4633b5e
Detections:
win_zloader_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ZLoader

DLL dll 00e0c18191f6300aa197b657c7596a2fc85247572d64ff3c2711b0b5707c2d13

(this sample)

  
Delivery method
Distributed via web download

Comments