MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4e49f5147939257640ba4990f520c9dbe355c83b73d9deadfc8505c4a09f931d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: 4e49f5147939257640ba4990f520c9dbe355c83b73d9deadfc8505c4a09f931d
SHA3-384 hash: e86d3e7c376eb177c0f8a86c257abfece37583ac4a2dcb6525bec69476004b77393b1c151a4789489cc17072cfea5132
SHA1 hash: a94c136beeedfc6d92b6a51b33a9bd2bbb538de4
MD5 hash: e23bae43915a338ad4de3e90547f10f3
humanhash: william-two-nineteen-arkansas
File name:zeusaes_2.9.6.1.vir
Download: download sample
Signature ZeuS
File size:202'752 bytes
First seen:2020-07-19 19:22:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 64d3cc13ba9aa3fac67b5a0b485961c6
ssdeep 3072:0kdVa3bCxXY6kCa15ibOY6DnviKf0CuHTtPPlebUPx5X4NiEXur10dgE8w9:0Kg3Y5U5FpvXRuH5PPlegPP8iVmeE8w
TLSH 1514F19E035DEE9DC15642FC14E29DC72A98EE18B3354EEB68D422DFE14B1690F4B342
Reporter @tildedennis
Tags:ZeuS zeusaes


Twitter
@tildedennis
zeusaes version 2.9.6.1

Intelligence


File Origin
# of uploads :
1
# of downloads :
18
Origin country :
US US
Mail intelligence
No data
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Threat name:
Win32.Trojan.Zbot
Status:
Malicious
First seen:
2014-02-21 18:20:00 UTC
AV detection:
30 of 31 (96.77%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Adds Run key to start application
Loads dropped DLL
Deletes itself
Executes dropped EXE
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments