MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cbf6848b72b118e090953347982de71cfe1510dfdc4affdb1ee4d5d62af428d6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ZLoader


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: cbf6848b72b118e090953347982de71cfe1510dfdc4affdb1ee4d5d62af428d6
SHA3-384 hash: d180ce0735e5944dd1ce536ad159baf43c2cff49d848d108e83fcf13d34b977a7cfce8f540405366cda7b7b615e3fd22
SHA1 hash: 36d0b1172673405a7d144a1a34841e794cea9e5a
MD5 hash: d657bd947fecdb34e989349b6f72daac
humanhash: arkansas-enemy-music-tango
File name:microsoft_shared.tmp
Download: download sample
Signature ZLoader
File size:588'632 bytes
First seen:2020-12-05 12:16:07 UTC
Last seen:2021-06-15 06:20:25 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash e17c7e3fa7189a6c1d0d2d15de68dde9 (1 x ZLoader)
ssdeep 3072:ocAZRRjYUoyi1f3OkOpO2jRve3uwoY+ZsGMpRpxjsoJlERTv6UNonpwfHYToG7L:oNTGOvRvEuPtZsGMpRpxoo0cnpwgT7L
Threatray 59 similar samples on MalwareBazaar
TLSH B9C41EC9E76767B0E8D08E793146CC82AED57694F8AC21D8E70609BDCFF934201C576A
Reporter nao_sec
Tags:Malsmoke ZLoader

Intelligence


File Origin
# of uploads :
3
# of downloads :
357
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Delayed writing of the file
Delayed reading of the file
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Creates autostart registry keys with suspicious values (likely registry only malware)
Machine Learning detection for dropped file
Machine Learning detection for sample
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 327220 Sample: microsoft_shared.tmp Startdate: 05/12/2020 Architecture: WINDOWS Score: 52 29 Machine Learning detection for sample 2->29 31 Machine Learning detection for dropped file 2->31 6 loaddll32.exe 2 2->6         started        8 regsvr32.exe 2->8         started        10 regsvr32.exe 2->10         started        process3 process4 12 msiexec.exe 3 25 6->12         started        17 regsvr32.exe 8->17         started        19 regsvr32.exe 10->19         started        dnsIp5 23 yuidskadjna.com 12->23 25 wiewjdmkfjn.com 12->25 27 3 other IPs or domains 12->27 21 C:\Users\user\AppData\Roaming\...\sareiz.dll, PE32 12->21 dropped 33 Creates autostart registry keys with suspicious values (likely registry only malware) 12->33 file6 signatures7
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-12-05 12:17:05 UTC
AV detection:
19 of 28 (67.86%)
Threat level:
  5/5
Result
Malware family:
zloader
Score:
  10/10
Tags:
family:zloader botnet:personal campaign:personal botnet trojan
Behaviour
Suspicious use of WriteProcessMemory
Zloader, Terdot, DELoader, ZeusSphinx
Malware Config
C2 Extraction:
https://iqowijsdakm.com/gate.php
https://wiewjdmkfjn.com/gate.php
https://dksaoidiakjd.com/gate.php
https://iweuiqjdakjd.com/gate.php
https://yuidskadjna.com/gate.php
https://olksmadnbdj.com/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
Unpacked files
SH256 hash:
f8c884a77e730bc8f28e2bf02191366c7149b04afd254c252dfd61855ef290f2
MD5 hash:
e506d676019a74b45336068301e61ec2
SHA1 hash:
ba7d0c1716ad86feecf6f8fa1b2d0c45e1d1cf03
Detections:
win_zloader_auto
SH256 hash:
cbf6848b72b118e090953347982de71cfe1510dfdc4affdb1ee4d5d62af428d6
MD5 hash:
d657bd947fecdb34e989349b6f72daac
SHA1 hash:
36d0b1172673405a7d144a1a34841e794cea9e5a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments