MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 83c31903a72e894c0c0a74bc456a9ce007991bf682f1d072905865207adc8fbf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
ZLoader
Vendor detections: 8
| SHA256 hash: | 83c31903a72e894c0c0a74bc456a9ce007991bf682f1d072905865207adc8fbf |
|---|---|
| SHA3-384 hash: | e3b008a6aa44a006c3eb38fefb69dde0fa8bb8f1bc841bd7835e39c840d884cd68d4f3a353c4e98110edfa707a359024 |
| SHA1 hash: | f8bdc43c739668087d3d754587c62e2498a45559 |
| MD5 hash: | bfcff5e7e6343d0d16a52eddf28d7e59 |
| humanhash: | black-nitrogen-ohio-bulldog |
| File name: | bfcff5e7e6343d0d16a52eddf28d7e59 |
| Download: | download sample |
| Signature | ZLoader |
| File size: | 85'945 bytes |
| First seen: | 2021-06-24 08:31:00 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 378c4792225854c10b4a5f5d67ecdbd2 (2 x ZLoader, 1 x Adware.PushWare, 1 x Adware.Generic) |
| ssdeep | 1536:lTViOcRUBWC2jZP2ITQX5+e7ZnbHJNk/jFydDEJ4AZD6nm3ZjayurLx:lTUOPWC/IUJtZnbHJy/wBc4w6m3Zjayw |
| Threatray | 2 similar samples on MalwareBazaar |
| TLSH | 3083D01662D1E8FBC9928F300A7A2F3AABFAA725101943533BB19F9DBD173478C1D141 |
| Reporter | |
| Tags: | 32 exe ZLoader |
Intelligence
File Origin
# of uploads :
1
# of downloads :
144
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
bfcff5e7e6343d0d16a52eddf28d7e59
Verdict:
No threats detected
Analysis date:
2021-06-24 08:37:12 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
rans.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Contain functionality to detect virtual machines
Contains functionality to infect the boot sector
Contains functionality to register a low level keyboard hook
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes many files with high entropy
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Strictor
Status:
Malicious
First seen:
2021-06-24 08:31:19 UTC
AV detection:
22 of 46 (47.83%)
Threat level:
5/5
Verdict:
malicious
Result
Malware family:
zloader
Score:
10/10
Tags:
family:zloader bootkit botnet discovery evasion persistence spyware stealer trojan vmprotect
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Checks installed software on the system
Checks whether UAC is enabled
Drops Chrome extension
Maps connected drives based on registry
Writes to the Master Boot Record (MBR)
Loads dropped DLL
Reads user/profile data of web browsers
Creates new service(s)
Downloads MZ/PE file
Executes dropped EXE
Modifies Installed Components in the registry
Sets DLL path for service in the registry
VMProtect packed file
Modifies system executable filetype association
Registers COM server for autorun
Zloader, Terdot, DELoader, ZeusSphinx
Unpacked files
SH256 hash:
dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
MD5 hash:
00a0194c20ee912257df53bfe258ee4a
SHA1 hash:
d7b4e319bc5119024690dc8230b9cc919b1b86b2
SH256 hash:
393b83eea1a26874e0148e2609438f05fb59cd3172509c6c1a356e25c3b4fb17
MD5 hash:
2b2ce6a4724773710667d8e892b8d71e
SHA1 hash:
bc497b829d52d0bca139e7db9792b58a6c5ccac2
SH256 hash:
fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
MD5 hash:
254f13dfd61c5b7d2119eb2550491e1d
SHA1 hash:
5083f6804ee3475f3698ab9e68611b0128e22fd6
SH256 hash:
83c31903a72e894c0c0a74bc456a9ce007991bf682f1d072905865207adc8fbf
MD5 hash:
bfcff5e7e6343d0d16a52eddf28d7e59
SHA1 hash:
f8bdc43c739668087d3d754587c62e2498a45559
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.