MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5557fd15d615f360af1aefa6a7e2bed3382e26bdabb08d7e5a8f0f9387449f3a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ZLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 5557fd15d615f360af1aefa6a7e2bed3382e26bdabb08d7e5a8f0f9387449f3a
SHA3-384 hash: c674673dff0f17ee8ced994ec9cbb4ef23bfdbb8a45a82f4788b01737b60cf7a4fd4fca8cdbde6a2837e4d66bcf5a27a
SHA1 hash: 949dd66a0ef0bbb40b93b983f095ced6df305921
MD5 hash: f59c23f465b7f2e73e2615a5a7dcc40c
humanhash: robert-steak-ink-dakota
File name:Delivery.bin
Download: download sample
Signature ZLoader
File size:297'984 bytes
First seen:2020-07-06 20:35:50 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash da862d38fd295304d813f4fa870d8c35 (1 x ZLoader)
ssdeep 6144:0/dUezS/xG7h8zMiiknZfSPjI8jUedq7dHr6iC8+xLDAFm+Zws2YiMFSp22sdo8E:VJG7E/vnZfIoew7dHWysLDuZ/tV5dZmT
Threatray 1 similar samples on MalwareBazaar
TLSH A954AED5943A4137FE1BD0BC554FAE32D32A96C46BEEB4506E829359B05F7A8C4322C3
Reporter j_dubp
Tags:ZLoader


Avatar
j_dubp
#JNLP attachment downloading FedEx_Receipt.jar from hXXps[://]nicedelivery[.]club delivering #ZLoader DLL from hXXps[://]deliverynice[.]club

Intelligence


File Origin
# of uploads :
1
# of downloads :
97
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-07-06 16:40:01 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
zloader
Result
Malware family:
zloader
Score:
  10/10
Tags:
trojan botnet family:zloader persistence spyware
Behaviour
Suspicious behavior: EnumeratesProcesses
Runs net.exe
Discovers systems in the same network
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Modifies service
Reads user/profile data of web browsers
Blacklisted process makes network request
Zloader, Terdot, DELoader, ZeusSphinx
Malware Config
C2 Extraction:
https://stoutorder.xyz/rest.php
UEj83tgi4gns57O4
eX�A�ץ�K8�z�d�or�����"t��r�҂.�ߨ=��FE�hI�j��En�PsO��<��M �KN��;4�Y �8��\ �q������8Gp�;�pm!g
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

8CD253EC8BA47EB1C5C551575A3A1095

ZLoader

Executable exe 5557fd15d615f360af1aefa6a7e2bed3382e26bdabb08d7e5a8f0f9387449f3a

(this sample)

  
Dropped by
MD5 8CD253EC8BA47EB1C5C551575A3A1095
  
Delivery method
Distributed via e-mail attachment

Comments