MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 07b9bd35d94b627cd2124f21985d2af0bde4a763857d476c02ccacee1a7b00e5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: 07b9bd35d94b627cd2124f21985d2af0bde4a763857d476c02ccacee1a7b00e5
SHA3-384 hash: 171635037c829925ab184cb6e277520cc4d7e4ea31a5f77db712a67a1f15c3b462b84101996fad13cfde90a46ded6a10
SHA1 hash: 892bbab65013e643396c36b9d0c37dd24474f187
MD5 hash: 118c5062f58d84356b11c513d3d5cc83
humanhash: robert-pluto-foxtrot-arizona
File name:uncategorized_3.0.1.0.vir
Download: download sample
Signature ZeuS
File size:134'144 bytes
First seen:2020-07-19 19:51:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c6334139e28a0c07891d110689c3d3e3
ssdeep 3072:/CUpEhlnQnEl9e3ufT1n7/wE7jNhf6bheH1US+y6CC4GoVDay4:/CUpEhld9DfhrjNhf6bXSh6zDos
TLSH 2AD3E123481284BFD42F49733636338B767FEA598289C6EB7D00237DA8DB5C5C69E581
Reporter @tildedennis
Tags:uncategorized ZeuS


Twitter
@tildedennis
uncategorized version 3.0.1.0

Intelligence


File Origin
# of uploads :
1
# of downloads :
51
Origin country :
US US
Mail intelligence
No data
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
60 / 100
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Rorpian
Status:
Malicious
First seen:
2012-03-27 08:54:00 UTC
AV detection:
23 of 25 (92.00%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
NTFS ADS
Suspicious use of FindShellTrayWindow
Modifies Internet Explorer settings
Suspicious use of WriteProcessMemory
Suspicious use of SendNotifyMessage
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Modifies system certificate store
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Deletes itself
Loads dropped DLL
Executes dropped EXE
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments