MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 121d7fc3a0a43a6ef4b73f564175b92727281155b221ff6f34c00d73438b679e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ZLoader


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 121d7fc3a0a43a6ef4b73f564175b92727281155b221ff6f34c00d73438b679e
SHA3-384 hash: 352c5eaaff1ecdc1a39a647fb9edb3c5f1aea6bb7df0704d88bc63b2f99cd4aa99034ef46d512a481b3dab571a3596c1
SHA1 hash: 9a7738f3f73d78d9fe18ba5401081d27f4222c8d
MD5 hash: 9eea7a0571baf33fa6877e8f8ebb3ad7
humanhash: twenty-magnesium-fix-robin
File name:JEsNEuI.dll
Download: download sample
Signature ZLoader
File size:364'544 bytes
First seen:2020-06-26 08:42:30 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 3e992137b4b72360676077caae312186 (3 x ZLoader)
ssdeep 6144:IOA9EZYHHOsAFPtetI7AW7JOpoTIXbv6M19HBqxJPVZ5IebbnB:9A9EZgAFPtkI751OnrRbOJ1P
Threatray 211 similar samples on MalwareBazaar
TLSH D6746D2033B5442CF3574B3D88A2C2735999FD82D575BDEF30C12E8B64472D386A9B9A
Reporter JAMESWT_WT
Tags:dll ZLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
89
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Threat name:
Win32.Trojan.ZLoader
Status:
Malicious
First seen:
2020-06-26 00:30:43 UTC
File Type:
PE (Dll)
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
zloader
Score:
  10/10
Tags:
trojan botnet family:zloader persistence
Behaviour
Runs net.exe
Discovers systems in the same network
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Modifies service
Suspicious use of SetThreadContext
Blacklisted process makes network request
Zloader, Terdot, DELoader, ZeusSphinx
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments