MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7782918de66454c18112d62adba35e71fcfa0fe360676a5bac52453d5e05e17e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: 7782918de66454c18112d62adba35e71fcfa0fe360676a5bac52453d5e05e17e
SHA3-384 hash: d3f842bf6933946f75a477f1048e4abd771a6df7afa10159354700dd529d74500d1cebc23e6867489a87419dd57133d1
SHA1 hash: deb9946fdc2dc1ed2ae48c1492e0b26a0bfdf54c
MD5 hash: 7a86f267a4b481b4c8c46536c2e8dfc7
humanhash: zebra-east-tennis-fanta
File name:unnamed 2_3.9.8.53.vir
Download: download sample
Signature ZeuS
File size:118'784 bytes
First seen:2020-07-19 19:35:14 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 1ea7413ae7b1f47fadc4df8876ef4fdf
ssdeep 3072:NPwWGUvRw1pJNL1eHh73rth+QvINAh6bYLESxLv6:n/CpJI73rP7CAhcJ6
TLSH 62C3F15DD6059AAFE8E681F9B7F2949F611C2A4C4F2468CFC8F48D69613C1CA36310F6
Reporter @tildedennis
Tags:unnamed 2 ZeuS


Twitter
@tildedennis
unnamed 2 version 3.9.8.53

Intelligence


File Origin
# of uploads :
1
# of downloads :
22
Origin country :
FR FR
Mail intelligence
No data
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Threat name:
Win32.Trojan.Zbot
Status:
Malicious
First seen:
2011-07-01 03:58:00 UTC
AV detection:
28 of 30 (93.33%)
Threat level
  2/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments