MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7b2788887c2d1b642d792f5b7200834f075e72d9f6c12d02cc636e59f6840756. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara 1 Comments

SHA256 hash: 7b2788887c2d1b642d792f5b7200834f075e72d9f6c12d02cc636e59f6840756
SHA3-384 hash: 70fbd6953a5c28145b8321f7f9356c613f79acf8bc7d5313e1442c26f84dee08aaf80f63bbd3c59d333611376de4c72c
SHA1 hash: a8fd87b771f7ab5cd4b246d42b4c4fd7e27bb1d4
MD5 hash: 421ce3f0c51eaab4277de3c72f758628
humanhash: king-north-vegan-robin
File name:vmzeus_4.6.9.0.vir
Download: download sample
Signature ZeuS
File size:169'232 bytes
First seen:2020-07-19 16:33:22 UTC
Last seen:2020-07-19 19:09:07 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f539e8a0e56261ec38b88d7068a8440f
ssdeep 3072:w3V8RMaNPnZvMp3aitgUt59pLyyrxAO2Q4b7q0RknpuNm2b6Z:wWxFnZvKKitgUtRLyyFHf871W4NmW6Z
TLSH 11F3BF25BEC244F3D9E726756A1C7737B3BECA1876149C07C3A95D422933863622E317
Reporter @tildedennis
Tags:vmzeus ZeuS


Twitter
@tildedennis
vmzeus version 4.6.9.0

Intelligence


File Origin
# of uploads :
4
# of downloads :
17
Origin country :
US US
Mail intelligence
No data
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
60 / 100
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Zeus
Status:
Malicious
First seen:
2014-06-14 01:07:00 UTC
AV detection:
27 of 31 (87.10%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Program crash
Program crash
Threat name:
Unknown
Score:
1.00

Yara Signatures


Rule name:win_kins_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments