MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 51d91d2e7e9aeee2a291dc1f7eadd9e422d159aef4cf902ef9038d951527636f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: 51d91d2e7e9aeee2a291dc1f7eadd9e422d159aef4cf902ef9038d951527636f
SHA3-384 hash: 6466054119aab6c91015b784eef7079ee64ac76b2d8255218e86c3132313242d25dd6d6a95e3676852d3fd14d8afb37d
SHA1 hash: 272f976b647b7343dcb33af4cbff81a64b2a9cf1
MD5 hash: 9d2d10f4c5c119ca971bef004f123a01
humanhash: georgia-california-maine-tennis
File name:zeus 1_1.4.1.2.vir
Download: download sample
Signature ZeuS
File size:75'264 bytes
First seen:2020-07-19 17:18:13 UTC
Last seen:2020-07-19 19:14:27 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2c4e7d67a0968706578b2f7f855b2cfa
ssdeep 1536:CCtZ/Mra9z8G+XFfbEuma6jzxZv5lOSFowQfRDkw06lF1nQS0qa70K:CCfMa9sZbEuIfrO9wWUknQS0qa70K
TLSH E673F081FED3FF42FBC14E75178ACBF2D6B6D4418185D39BEBD32418E821419C848A6A
Reporter @tildedennis
Tags:ZeuS zeus 1


Twitter
@tildedennis
zeus 1 version 1.4.1.2

Intelligence


File Origin
# of uploads :
2
# of downloads :
25
Origin country :
US US
Mail intelligence
No data
Vendor Threat Intelligence
Gathering data
Detection(s):
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Result
Threat name:
Unknown
Detection:
malicious
Classification:
phis
Score:
64 / 100
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Zbot
Status:
Malicious
First seen:
2011-06-14 11:54:00 UTC
AV detection:
22 of 25 (88.00%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Drops file in Windows directory
Drops file in Windows directory
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Modifies WinLogon for persistence
Modifies WinLogon for persistence
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments