MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 98d8b13f297953a0b4f915e55cd527f0f1461d42b917b77aa99f05446f6fdd12. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ZeuS


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 98d8b13f297953a0b4f915e55cd527f0f1461d42b917b77aa99f05446f6fdd12
SHA3-384 hash: f32d7e5983ec388e16051b3f3f1a0ca9cf010049434baa8beb0efe36c3ce086c3437694c50fd96be30f0af2b21c57282
SHA1 hash: 5b112c77ea208d570eedaad0d5880e6fc19cffbc
MD5 hash: 4fc29198fcc9a9fe3b31f7549d54d8e9
humanhash: july-twenty-minnesota-red
File name:98d8b13f297953a0b4f915e55cd527f0f1461d42b917b77aa99f05446f6fdd12
Download: download sample
Signature ZeuS
File size:161'962 bytes
First seen:2021-02-21 14:03:02 UTC
Last seen:2021-02-21 15:47:58 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 3d72c2249f14f4cc74dd098fd236f98a (1 x ZeuS)
ssdeep 3072:sK9smc3K+aCj93AnXGaNkdrgm9nl0JdqFJG2GztR07IVgfXs7ZsFz6x:JfcVho2eaJnl0JoLGtzz074IsYOx
Threatray 128 similar samples on MalwareBazaar
TLSH DAF3F1359392287FDC7ADAF80B21FEDE65F728C612E24C5CDD96034FC1ACD69891085A
Reporter @tildedennis
Tags:uncategorized ZeuS


Twitter
@tildedennis
uncategorized version 2.3.3.9

Intelligence


File Origin
# of uploads :
2
# of downloads :
1'212
Origin country :
FR FR
Mail intelligence
No data
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Unauthorized injection to a recently created process
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
bank.troj.evad
Score:
92 / 100
Signature
Antivirus / Scanner detection for submitted sample
Contains VNC / remote desktop functionality (version string found)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected ZeusVM e-Banking Trojan
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Zeus
Status:
Malicious
First seen:
2013-02-13 00:57:00 UTC
AV detection:
22 of 25 (88.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Deletes itself
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
3024f13d2110282181e4c4a7be84568cda7b807f76a6bffdaf386f9bc6caf5b2
MD5 hash:
a17185b5f33ed9deacd501c0e3a00374
SHA1 hash:
fcdd689810b2ce3a8bfbfb56a642b95a55b64379
SH256 hash:
98d8b13f297953a0b4f915e55cd527f0f1461d42b917b77aa99f05446f6fdd12
MD5 hash:
4fc29198fcc9a9fe3b31f7549d54d8e9
SHA1 hash:
5b112c77ea208d570eedaad0d5880e6fc19cffbc

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments