MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a0dc2f247f51601b44404caa288f98c8cb081a7b0f4cdfda53607cd783294373. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ZLoader


Vendor detections: 3


Intelligence 3 IOCs YARA 1 File information Comments

SHA256 hash: a0dc2f247f51601b44404caa288f98c8cb081a7b0f4cdfda53607cd783294373
SHA3-384 hash: 57d64e32f3f724800c3846c9735fa3ea9460f0701f73714b19087701731c57cdd9c6594025ffeb6d608ce98a17878b0d
SHA1 hash: daff0608b2758b6cb10e68b0d1f2f25da0e136dd
MD5 hash: e5c9911837c78a94dc7ccdc9c4814d2a
humanhash: carpet-beryllium-two-alanine
File name:FVS_37973521.xlsm
Download: download sample
Signature ZLoader
File size:99'629 bytes
First seen:2020-06-12 06:09:24 UTC
Last seen:2020-06-12 12:03:50 UTC
File type:Excel file xlsm
MIME type:application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
ssdeep 1536:0sUNW1rXPBckDNIVXnR8TeYSSkCXgN+Uu+j6XJaRqWD/0ACKNT/MDyL+:0sH7bxWXnCjiubXKD/EUkWL+
TLSH BDA3BF0BE340DF13C11820FD2A0B0DE6AD5F279A65C6F6412046AAAF6F157E34ECE65D
Reporter abuse_ch
Tags:geo POL xlsm ZLoader


Avatar
abuse_ch
Malspam distributing ZLoader:

HELO: mx138-185.futurehost.pl
Sending IP: 91.200.185.138
From: James Robinson <robinsonjamesok@interia.pl>
Subject: FVS 37983529 ot STALWENT Sp. z o.o.
Attachment: FVS_37973521.xlsm

ZLoader payload URL:
https://ternerdrivew.at/3/wwf.exe

ZLoader C2:
https://militanttra.at

Intelligence


File Origin
# of uploads :
3
# of downloads :
89
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Document-Word.Trojan.Kryptik
Status:
Malicious
First seen:
2020-06-12 06:11:03 UTC
File Type:
Document
Extracted files:
38
AV detection:
15 of 31 (48.39%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
macro
Behaviour
Enumerates system info in registry
Modifies Internet Explorer settings
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetWindowsHookEx
Checks processor information in registry
Enumerates connected drives
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:SharedStrings
Author:Katie Kleemola
Description:Internal names found in LURK0/CCTV0 samples

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

ZLoader

Excel file xlsm a0dc2f247f51601b44404caa288f98c8cb081a7b0f4cdfda53607cd783294373

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments