MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 26da38192a595e7c444ed150dfea0671156f3721e8c0ba4608afe405f62c5525. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: 26da38192a595e7c444ed150dfea0671156f3721e8c0ba4608afe405f62c5525
SHA3-384 hash: a694095ec0286848f976ac8d4b875f0f939de1c9569a570161b00518127c8e225f1a9fdbc278f21b4db52ab0d3ecd40d
SHA1 hash: 250b7c4e03094da5b2bb8cd49ba57065ce188bc7
MD5 hash: ab487e4eb8eddcac9fd6bcec1abdc026
humanhash: mirror-sixteen-red-vermont
File name:uncategorized_3.0.0.5.vir
Download: download sample
Signature ZeuS
File size:292'077 bytes
First seen:2020-07-19 19:31:00 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7d045f1a37c506e7f8f57ba9012187e3
ssdeep 3072:E/hCI/6nz5y0v+ux6bCwJujTLUzReX1jS3mu8zmsME/AencwRfBRq1:chx3y6LsHy64+qVYAw1g
TLSH 4C54B5239B726CD2F59052B2C9C91FA5705BBF319578F08E6F3025CF41A92E8AF5311A
Reporter @tildedennis
Tags:uncategorized ZeuS


Twitter
@tildedennis
uncategorized version 3.0.0.5

Intelligence


File Origin
# of uploads :
1
# of downloads :
20
Origin country :
FR FR
Mail intelligence
No data
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Threat name:
Win32.Trojan.Zbot
Status:
Malicious
First seen:
2014-12-12 22:05:00 UTC
AV detection:
29 of 30 (96.67%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Deletes itself
Executes dropped EXE
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments