MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3a4ca58b0a2e72a264466a240c6636f62b8742ffbc96ce14e2225f0e57012e96. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ZLoader


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments 1

SHA256 hash: 3a4ca58b0a2e72a264466a240c6636f62b8742ffbc96ce14e2225f0e57012e96
SHA3-384 hash: 30a7f3eab44c7280eee41eaf12d2a7f7ebf1a7c8702439ca59aafeed281dc6f7652bbbe59d4c1871f3f15112435cb8ea
SHA1 hash: cc4bba83f31c2d15ebd9432e3d832a4c3de8c516
MD5 hash: 2f5674540983bc9a2d8ceb2078fa01b6
humanhash: paris-single-triple-magazine
File name:unpacked_zloader_21_10_4.dll
Download: download sample
Signature ZLoader
File size:149'504 bytes
First seen:2021-10-18 15:32:20 UTC
Last seen:2021-10-18 17:18:34 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash e8478bbcb7a4fed9fd3a17a0d9e29028 (1 x ZLoader)
ssdeep 3072:zad/Bacuyiy13Babz1w+99lfuFhUgrIH2xqUpw/VAfyV:OdD13B6zd99gUgrIHOqUpw9Aa
Threatray 82 similar samples on MalwareBazaar
TLSH T1BEE33A16A854C638F80100B55DACBB7E9C5AC50D7A238ABBC7C1C8D09FE96B0777E61D
Reporter aaqeel87
Tags:123 dll unpacked ZLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
285
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
67%
Tags:
greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
ZLoader
Detection:
malicious
Classification:
troj.evad
Score:
84 / 100
Signature
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Found malware configuration
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected ZLoader
Behaviour
Behavior Graph:
Threat name:
Win32.Downloader.ZLoader
Status:
Malicious
First seen:
2021-10-18 15:33:08 UTC
AV detection:
18 of 28 (64.29%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
3a4ca58b0a2e72a264466a240c6636f62b8742ffbc96ce14e2225f0e57012e96
MD5 hash:
2f5674540983bc9a2d8ceb2078fa01b6
SHA1 hash:
cc4bba83f31c2d15ebd9432e3d832a4c3de8c516
Detections:
win_zloader_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_zloader_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.zloader.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
Ali Aqeel commented on 2021-10-18 16:36:31 UTC

[Blog] write-up analyzing #Zloader malware.

Ref: https://aaqeel01.wordpress.com/2021/10/18/zloader-reversing/
tweet: https://twitter.com/aaqeel87/status/1450134416903262222?s=20