MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1294e6cce4285225612898a4fbc75a640e69dc0f246af698e2c91d48ad2d61b8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: 1294e6cce4285225612898a4fbc75a640e69dc0f246af698e2c91d48ad2d61b8
SHA3-384 hash: 5033af46fd5c90c8cda3da59836787c3c5c74b845908d372e5865484d632ff7dfd5a4578c0cfd830b1d4fd2456a5d462
SHA1 hash: 19017d8a1a7c6ded1ca488d31aee23ce58e71ce8
MD5 hash: 0e963c9b8282042690437d69a8ad7395
humanhash: blossom-lemon-mountain-coffee
File name:zeusaes_2.7.6.6.vir
Download: download sample
Signature ZeuS
File size:183'933 bytes
First seen:2020-07-19 19:52:03 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash aeceeef30d07eabae260080b82b05c48
ssdeep 3072:FSm3CTNRk5qJzdqmXnnx0FpDNu8inMpEYfAoo23ISQqTRJJ0ub2q5ti:FSmgk5qJD3nxc9iMXAo1IPqTRj0Ka
TLSH 0A04022FFB821672F1261AB5015F667596D19A341B7083C7BF8CBE212BB63E56930720
Reporter @tildedennis
Tags:zeusaes


Twitter
@tildedennis
zeusaes version 2.7.6.6

Intelligence


File Origin
# of uploads :
1
# of downloads :
32
Origin country :
US US
Mail intelligence
No data
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Connection attempt to an infection source
Threat name:
Win32.Trojan.Zbot
Status:
Malicious
First seen:
2013-05-10 21:09:00 UTC
AV detection:
30 of 31 (96.77%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Deletes itself
Executes dropped EXE
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments