MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 65e4609b0140e9323be0b019eab0af3a51ccd2e004967749fa182160d60f60c0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 65e4609b0140e9323be0b019eab0af3a51ccd2e004967749fa182160d60f60c0
SHA3-384 hash: e4e67a0b26a35d84fec9474d96a657eea58f6c1c4bc3ff4c23da2d6e31c2339bbe032aac635c35137a431c9cfbff0fa2
SHA1 hash: fd2e71d9b09fb44aadf99df5ef77f5e95154b1af
MD5 hash: 644dce104e1f26cdaf93e40e5bd3874d
humanhash: timing-rugby-alaska-ten
File name:65e4609b0140e9323be0b019eab0af3a51ccd2e004967749fa182160d60f60c0
Download: download sample
File size:166'912 bytes
First seen:2020-08-09 18:30:41 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 25ee5018dcf518e92bbed6b4da981676
ssdeep 3072:vwNCe+FREhH67JK1x+sUhWucMPjRkad8FifRWnv0:UCe+FkdrohkMPdt1Mns
Threatray 45 similar samples on MalwareBazaar
TLSH 71F3E015B362D079E061183018A6D7E17DADFC6013B4405B3BE06ABD5EB63D86EA8F1B
Reporter tildedennis
Tags:unnamed 4


Avatar
tildedennis
unnamed 4 version 1.9.0.1

Intelligence


File Origin
# of uploads :
1
# of downloads :
99
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Result
Threat name:
Detection:
malicious
Classification:
bank.troj.evad
Score:
72 / 100
Signature
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Contains VNC / remote desktop functionality (version string found)
Detected ZeusVM e-Banking Trojan
Disables the windows security center
Injects a PE file into a foreign processes
Machine Learning detection for sample
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 260259 Sample: wP8JBScjdm Startdate: 09/08/2020 Architecture: WINDOWS Score: 72 25 Machine Learning detection for sample 2->25 27 Contains VNC / remote desktop functionality (version string found) 2->27 29 Disables the windows security center 2->29 8 wP8JBScjdm.exe 2->8         started        process3 signatures4 31 Detected ZeusVM e-Banking Trojan 8->31 33 Contains functionality to inject code into remote processes 8->33 35 Injects a PE file into a foreign processes 8->35 37 Contains functionality to detect sleep reduction / modifications 8->37 11 wP8JBScjdm.exe 8->11         started        process5 process6 13 net.exe 1 11->13         started        15 net.exe 1 11->15         started        process7 17 conhost.exe 13->17         started        19 net1.exe 1 13->19         started        21 conhost.exe 15->21         started        23 net1.exe 1 15->23         started       
Threat name:
Win32.Trojan.Zeus
Status:
Malicious
First seen:
2012-02-12 18:20:00 UTC
AV detection:
24 of 25 (96.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments