MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c381ea5f5924e2b62d56e5c9ff223598649ff8884a0f88c4362409190bcc5f3e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: c381ea5f5924e2b62d56e5c9ff223598649ff8884a0f88c4362409190bcc5f3e
SHA3-384 hash: 6fe07cd32e9af04ffa2d8ba356759c156ede27e9f4f36c12ccb967d20679973eccd813791b5207a2abc5bda8cecd7e21
SHA1 hash: 7533a161e30270bd599d9439e0514f116d4d3cc9
MD5 hash: d43d030290edf6eda09c93ac2425addd
humanhash: thirteen-coffee-mango-one
File name:gameover_0.0.0.19.vir
Download: download sample
Signature ZeuS
File size:178'176 bytes
First seen:2020-07-19 16:35:20 UTC
Last seen:2020-07-19 19:09:47 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b29d36dcca1a10e67c36266a6e7357d5
ssdeep 3072:XFD94rsW66OitHWdjcIHPg9borHn7iTS4cLDHEyq+:Xb4QyOiWYkN7j4cLDHEq
TLSH 1304F125300623AAEA70517FD73B3F94CC6D603653063E5439A6F5CA1A2D3A1E3A5BC7
Reporter @tildedennis
Tags:gameover ZeuS


Twitter
@tildedennis
gameover version 0.0.0.19

Intelligence


File Origin
# of uploads :
4
# of downloads :
20
Origin country :
US US
Mail intelligence
No data
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Connection attempt to an infection source
Threat name:
Win32.Trojan.Zbot
Status:
Malicious
First seen:
2011-12-31 01:57:00 UTC
AV detection:
23 of 25 (92.00%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Deletes itself
Executes dropped EXE
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments