MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 17c1432427baae5d78a79ec3b031e7bd1cccdd7aa87f8334d828ed15669b8337. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 17c1432427baae5d78a79ec3b031e7bd1cccdd7aa87f8334d828ed15669b8337
SHA3-384 hash: f740ddb6f3b3f5337259c54debef8222387da93db37cf7ac4728bde89f93a1a8fa601b16f91d527fe3885a7ae32a3b7a
SHA1 hash: 1356e08fb2dc865347ea3ece26ae9e7024f6f1a4
MD5 hash: 68561d1d5ab3f8fac1809bbc0528beac
humanhash: three-happy-blossom-failed
File name:17c1432427baae5d78a79ec3b031e7bd1cccdd7aa87f8334d828ed15669b8337
Download: download sample
File size:2'075'684 bytes
First seen:2020-06-03 09:43:03 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer)
ssdeep 49152:xvf6MKhTI5IJ9q+OKBhkjT32wfhp3HQt8OY3Yw:xtKhTI5IJY1jrv2WOMYw
Threatray 11 similar samples on MalwareBazaar
TLSH 01A5D0E229CD95F4C9953A72E5E2AFE602D638143C3181E850EC62C97C5F4EA71D36CB
Reporter raashidbhatt
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
57
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Zusy
Status:
Malicious
First seen:
2020-06-03 23:56:00 UTC
AV detection:
27 of 31 (87.10%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion persistence
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Drops file in System32 directory
Modifies service
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
Checks BIOS information in registry
Identifies Wine through registry keys
Loads dropped DLL
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
ServiceHost packer
Modifies visiblity of hidden/system files in Explorer
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments