MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 19d32c1fc7c6fa9a5924aeb6ce69d8e5211c3e458eb51178171e0c75f129c48a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: 19d32c1fc7c6fa9a5924aeb6ce69d8e5211c3e458eb51178171e0c75f129c48a
SHA3-384 hash: dd997a96d353c24bd7fa7367521be7335ad56b4a1d4137500618e94ad9cd2d215d03173600fe1af3d57e2f16e44675f9
SHA1 hash: 72029dca348d3fa4faa43d9999fa1b744bb559cd
MD5 hash: 3706da30e1fc51212ae95aff2fae57ad
humanhash: neptune-zulu-berlin-undress
File name:uncategorized_9.0.0.2.vir
Download: download sample
Signature ZeuS
File size:229'900 bytes
First seen:2020-07-19 19:43:41 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 0add58d13d71b6a9b33bc440e61036b5
ssdeep 6144:bPWPdA/okhkF87ry1L7FTfiffjvHlmlt6Y5mJZmnDin:TH/xKYkPFDIJIH5mj4i
TLSH 09242210BBD468C3D3E844347B2B8FADAE856A75461F0461EA838AF594F4543BA4CFF4
Reporter @tildedennis
Tags:uncategorized ZeuS


Twitter
@tildedennis
uncategorized version 9.0.0.2

Intelligence


File Origin
# of uploads :
1
# of downloads :
29
Origin country :
FR FR
Mail intelligence
No data
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Threat name:
Win32.Trojan.Zbot
Status:
Malicious
First seen:
2012-08-09 17:26:00 UTC
AV detection:
39 of 41 (95.12%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
UPX packed file
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments