MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3917759ae65f10aec4f9d5e5628fead573d8f3b4bba59a8f1fcd6692ec563436. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: 3917759ae65f10aec4f9d5e5628fead573d8f3b4bba59a8f1fcd6692ec563436
SHA3-384 hash: 289b2cc4df7d6b4db6b15e6677ef9681b318fa3e5534c20e7f780a6a5be5d8499a35306229071c9d21ed624533666bc7
SHA1 hash: 950612793a50dac774040a1e99ead2160e63657c
MD5 hash: 60eaea81c77422b615b2cfd50417c87e
humanhash: single-three-uniform-north
File name:vmzeus_3.2.5.2.vir
Download: download sample
Signature VMZeuS
File size:323'729 bytes
First seen:2020-07-19 17:31:47 UTC
Last seen:2020-07-19 19:19:25 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 11553daf6e03a3855f453d17f402ebfc
ssdeep 6144:dr0lD4CTUl73KkeKN8lxQ5oQgPT5LAiLSgbRnZBP+esHIAUQv:dsECId3Kkeja5T0T5EuuejFQv
TLSH 2E64AE6BB64454A5F53B81F4A460B09BA52DFC372A848C2BB7C14B09747924BFEE131F
Reporter @tildedennis
Tags:vmzeus


Twitter
@tildedennis
vmzeus version 3.2.5.2

Intelligence


File Origin
# of uploads :
2
# of downloads :
20
Origin country :
FR FR
Mail intelligence
No data
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Unauthorized injection to a recently created process
Connection attempt to an infection source
Result
Threat name:
ZeusVM
Detection:
malicious
Classification:
bank.troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 247104 Sample: vmzeus_3.2.5.2.vir Startdate: 19/07/2020 Architecture: WINDOWS Score: 100 52 Antivirus / Scanner detection for submitted sample 2->52 54 Multi AV Scanner detection for submitted file 2->54 56 Detected ZeusVM e-Banking Trojan 2->56 58 3 other signatures 2->58 9 vmzeus_3.2.5.2.exe 1 2->9         started        13 Mozillawin.exe 1 2->13         started        15 Mozillawin.exe 1 2->15         started        process3 dnsIp4 48 3.2.5.2 AMAZON-02US United States 9->48 78 Detected unpacking (changes PE section rights) 9->78 80 Detected unpacking (overwrites its own PE header) 9->80 82 Detected ZeusVM e-Banking Trojan 9->82 84 Drops batch files with force delete cmd (self deletion) 9->84 17 vmzeus_3.2.5.2.exe 2 9->17         started        86 Injects a PE file into a foreign processes 13->86 21 Mozillawin.exe 13->21         started        23 Mozillawin.exe 15->23         started        signatures5 process6 file7 44 C:\Users\user\AppData\...\Mozillawin.exe, PE32 17->44 dropped 46 C:\Users\user\AppData\...\tmpa91b782a.bat, DOS 17->46 dropped 60 Drops executable to a common third party application directory 17->60 62 Tries to detect sandboxes / dynamic malware analysis system (registry check) 17->62 64 Tries to detect sandboxes / dynamic malware analysis system (mutex check) 17->64 25 Mozillawin.exe 1 17->25         started        28 cmd.exe 1 17->28         started        66 Tries to detect sandboxes / dynamic malware analysis system (tool check) 21->66 signatures8 process9 signatures10 68 Antivirus detection for dropped file 25->68 70 Detected unpacking (changes PE section rights) 25->70 72 Detected unpacking (overwrites its own PE header) 25->72 76 3 other signatures 25->76 30 Mozillawin.exe 1 12 25->30         started        74 Deletes itself after installation 28->74 34 conhost.exe 28->34         started        process11 dnsIp12 50 babybumred.com 30->50 88 Creates autostart registry keys with suspicious names 30->88 90 Maps a DLL or memory area into another process 30->90 92 Creates a thread in another existing process (thread injection) 30->92 94 3 other signatures 30->94 36 atRsFvtvqyxhAPseEM.exe 30->36 injected 38 atRsFvtvqyxhAPseEM.exe 30->38 injected 40 atRsFvtvqyxhAPseEM.exe 30->40 injected 42 15 other processes 30->42 signatures13 process14
Threat name:
Win32.Trojan.Zbot
Status:
Malicious
First seen:
2013-10-13 03:57:00 UTC
AV detection:
24 of 25 (96.00%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
evasion persistence
Behaviour
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of FindShellTrayWindow
Suspicious use of FindShellTrayWindow
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Adds Run key to start application
Adds Run key to start application
Loads dropped DLL
Deletes itself
Identifies Wine through registry keys
Identifies Wine through registry keys
Executes dropped EXE
Executes dropped EXE
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments