MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1f4549ff4616d88150d77bd2580d4955a163e9ae9b5854776286723269a05446. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: 1f4549ff4616d88150d77bd2580d4955a163e9ae9b5854776286723269a05446
SHA3-384 hash: 8e86f9df0da8d70f7b7560f920fd9566491d4a2aa7be76671f1e350308399795ed247fd85e942e4793ea58b58184c8e8
SHA1 hash: 3cd9885f3b195ab2b0f890450d47841916154264
MD5 hash: b43a53e6a7c6776e01c3e4ec45f25d1a
humanhash: uncle-island-ink-magazine
File name:grabbot_0.1.6.5.vir
Download: download sample
Signature ZeuS
File size:513'024 bytes
First seen:2020-07-19 17:26:51 UTC
Last seen:2020-07-19 19:17:42 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b7f9b97622940a3b0aa4c25deb72b06f
ssdeep 6144:T9SYUEYdzWXytIQiSIkEcWvNW5WF3Qxh9VnUM5XtnODsuWlt8x80oE3EG:TYdaXytNi+kW5QQxlFZmO2KrEV
TLSH C0B4E004BBE18032D46686F06F62C27599313C586E788BFE5B40FD6D1A3F25C89E17B6
Reporter @tildedennis
Tags:grabbot ZeuS


Twitter
@tildedennis
grabbot version 0.1.6.5

Intelligence


File Origin
# of uploads :
2
# of downloads :
20
Origin country :
FR FR
Mail intelligence
No data
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Threat name:
Win32.Trojan.Zbot
Status:
Malicious
First seen:
2016-04-30 06:22:00 UTC
AV detection:
25 of 29 (86.21%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
persistence spyware
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of FindShellTrayWindow
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SendNotifyMessage
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Adds Run key to start application
Checks whether UAC is enabled
Adds Run key to start application
Deletes itself
Reads user/profile data of web browsers
Reads user/profile data of web browsers
Deletes itself
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments