MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4afd18322fa314a305c50129c89764ca9f54238c5e89d86a4a312398e8e56ca8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ZLoader


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 4afd18322fa314a305c50129c89764ca9f54238c5e89d86a4a312398e8e56ca8
SHA3-384 hash: 670fc7e568e76e2aaca0d12452383ec5501ac6a0624642383add8c6f3ccd57e5fbac5e5edf48396762980ab1b6129536
SHA1 hash: 6fbe2c541fdb705f29899d7d67eb1c54decc620e
MD5 hash: 1187a2f3026eed231abc21c2749e4e63
humanhash: oranges-bluebird-alabama-arkansas
File name:zloader 2_1.0.5.0.vir
Download: download sample
Signature ZLoader
File size:145'408 bytes
First seen:2020-07-19 17:12:35 UTC
Last seen:2020-07-19 19:12:38 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6eb314104d69ef1412f930c6d145d0f5 (1 x ZLoader)
ssdeep 3072:WxJqEQmQfL0N8tEs9IWMLsKIUmkIp+L3aOF0sEzdmldTvTMMMy:+JxQmQUs9aLsZkTeOS5di1YNy
Threatray 51 similar samples on MalwareBazaar
TLSH CEE3391B0574C57AF5E240741A3DB3BBDE39A1017B224ED7D754A880AF2839C272A69F
Reporter tildedennis
Tags:ZLoader zloader 2


Avatar
tildedennis
zloader 2 version 1.0.5.0

Intelligence


File Origin
# of uploads :
2
# of downloads :
82
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Connection attempt to an infection source
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
92 / 100
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Dridex
Status:
Malicious
First seen:
2019-12-15 00:56:00 UTC
File Type:
PE (Exe)
AV detection:
20 of 27 (74.07%)
Threat level:
  5/5
Result
Malware family:
zloader
Score:
  10/10
Tags:
family:zloader
Behaviour
Zloader family
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments