MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 badc87166cc28491dcae0164e7dc027aeb4b98eea5f765f776f58d8683cdec6a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ZLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: badc87166cc28491dcae0164e7dc027aeb4b98eea5f765f776f58d8683cdec6a
SHA3-384 hash: f2c69387fa3baf17aa132fb7e52dc39d8e08917d60ea22473e72b85c947a35c2a47b954a6cedfd20fe7f0be07350753d
SHA1 hash: ab33331de0ab0f9dddb2b8eb8e4e8c92b18a9c61
MD5 hash: 96874e8ec64976899a1f7b90022f3e43
humanhash: four-glucose-black-equal
File name:entomology.srt
Download: download sample
Signature ZLoader
File size:230'744 bytes
First seen:2020-06-16 07:29:53 UTC
Last seen:2020-06-16 15:52:03 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash c56ea0f36b0a72751d5902f37565311d (1 x Gozi, 1 x ZLoader)
ssdeep 3072:XPbq/XSqcbXdOg9gkx/yrNPwwApe6eIDK+C9iKy6K7kDlUzYak6ve432+fGxsN5w:jqKDXdOAgUKXvji7oDvaNm4mSGqe9d
Threatray 53 similar samples on MalwareBazaar
TLSH 9234E0A1B98FCD2BCC316EBA9D7C495925D30D93277E808BE613A58C9497DBB5330207
Reporter JAMESWT_WT
Tags:dll ZLoader

Code Signing Certificate

Organisation:YIYEBWXQHAHXTYLOTE
Issuer:YIYEBWXQHAHXTYLOTE
Algorithm:sha1WithRSA
Valid from:Jun 14 19:26:50 2020 GMT
Valid to:Dec 31 23:59:59 2039 GMT
Serial number: -2CA223BBAFA27077B408C7B1EE203127
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 8375F57B296156411C7E41E1EDAE12E379CC1FAC85624CBFC55256A759BDF746
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
3
# of downloads :
75
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Ransomware.WannaCry
Status:
Malicious
First seen:
2020-06-16 01:13:56 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Result
Malware family:
zloader
Score:
  10/10
Tags:
trojan botnet family:zloader
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetThreadContext
Zloader, Terdot, DELoader, ZeusSphinx
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments