MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 be8703a1df11cbc97e900ed1d88fe5b37501083595912f9b6844e8dcf4299d9d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: be8703a1df11cbc97e900ed1d88fe5b37501083595912f9b6844e8dcf4299d9d
SHA3-384 hash: e1930868949178eb1a57b0f0f34f35954fe22e6d2e529d9447453b4f860e9dbb5aef5b73ff32ee242f4f19b2f70c1978
SHA1 hash: 672b1e05354dfbcefaf0e433e42be5e553f2cb85
MD5 hash: c425feee3641c4de361d169e063242f0
humanhash: grey-december-wolfram-sierra
File name:unnamed 2_2.0.8.11.vir
Download: download sample
Signature n/a
File size:108'032 bytes
First seen:2020-07-19 17:25:29 UTC
Last seen:2020-07-19 19:17:20 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 040128357c3a246f1f63e0c7813cd7cc
ssdeep 3072:Zw7RJGQjdP1I4v8t00f1NHENMY67ovcrMcr:ZCRUQhP1I4a021rYaEc/
TLSH 4BB31282F708358BC197AFF48134CFAB994E742C0A48BBD33B2A345798C235D965D5B8
Reporter @tildedennis
Tags:unnamed 2


Twitter
@tildedennis
unnamed 2 version 2.0.8.11

Intelligence


File Origin
# of uploads :
2
# of downloads :
22
Origin country :
FR FR
Mail intelligence
No data
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Threat name:
Win32.Trojan.Zbot
Status:
Malicious
First seen:
2012-06-03 13:16:00 UTC
AV detection:
20 of 25 (80.00%)
Threat level
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
UPX packed file
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments