MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 12e5c221195f7d0a47b98b5d5fff26ea8fc4ad4f76f1c21f47e3a73102f18c59. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ZLoader


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 12e5c221195f7d0a47b98b5d5fff26ea8fc4ad4f76f1c21f47e3a73102f18c59
SHA3-384 hash: dbc53fe4281587f694e7ff5c4091f6769d57624362fe02916db98c0d388f7fae2956b007b06e29a5837f19ec91fd4cbf
SHA1 hash: 6d850624e33b622e3d49db028a3286d0c27b1f9f
MD5 hash: 0f04a1e57dd1751b1fd625260cd73ab7
humanhash: charlie-fillet-whiskey-berlin
File name:BKiPsIo.dll
Download: download sample
Signature ZLoader
File size:481'624 bytes
First seen:2020-10-23 17:06:20 UTC
Last seen:2020-10-23 17:46:13 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 755b663af41000f221e5f41863887a71 (1 x ZLoader)
ssdeep 6144:pCE98sDXeHfijLo9qLV+yYqG1XWZ/6anVytD5lEW:pCS6HQSmkqG04awd
Threatray 46 similar samples on MalwareBazaar
TLSH 27A4C567A9C3DF04D13E40FBC5FCAEB8172182380D9D4F29E75E48B5FA574992A8026D
Reporter ffforward
Tags:dll password:777 signed sovietzloader ZLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
163
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Delayed writing of the file
Delayed reading of the file
Sending a UDP request
Threat name:
Win32.Trojan.PinkSbot
Status:
Malicious
First seen:
2020-10-23 17:08:05 UTC
AV detection:
24 of 28 (85.71%)
Threat level:
  5/5
Result
Malware family:
zloader
Score:
  10/10
Tags:
trojan botnet family:zloader
Behaviour
Suspicious use of WriteProcessMemory
Zloader, Terdot, DELoader, ZeusSphinx
Malware Config
C2 Extraction:
https://kochamkkkras.ru/gate.php
https://uookqihwdid.ru/gate.php
https://iqowijsdakm.ru/gate.php
https://wiewjdmkfjn.ru/gate.php
https://dksaoidiakjd.su/gate.php
https://iweuiqjdakjd.su/gate.php
https://yuidskadjna.su/gate.php
https://olksmadnbdj.su/gate.php
https://odsakmdfnbs.su/gate.php
https://odsakjmdnhsaj.su/gate.php
Unpacked files
SH256 hash:
89580952661e6b855eeff60a99e85dbfd8781afc58426d10998c15f08efbbf5c
MD5 hash:
c784e55a496e39292733633f21eb4eac
SHA1 hash:
553cf94e8067c0c8f4bf037a4ce20cffb3ba8098
Detections:
win_zloader_auto
SH256 hash:
12e5c221195f7d0a47b98b5d5fff26ea8fc4ad4f76f1c21f47e3a73102f18c59
MD5 hash:
0f04a1e57dd1751b1fd625260cd73ab7
SHA1 hash:
6d850624e33b622e3d49db028a3286d0c27b1f9f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

ZLoader

DLL dll 12e5c221195f7d0a47b98b5d5fff26ea8fc4ad4f76f1c21f47e3a73102f18c59

(this sample)

Comments