MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cf90fce260606f17508445c8347dc274157bd269c002fd705ab168be96f28538. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ZLoader


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: cf90fce260606f17508445c8347dc274157bd269c002fd705ab168be96f28538
SHA3-384 hash: fc42bd30c952870a3958ffb75190ea049abe6f3f9a493ce0ddbcb9d3e5b5f6045bead34c14b6d8df4d594e9b8a9cc054
SHA1 hash: 6e3bc68d2218ac23637b00df610c520772c736c5
MD5 hash: 1bf136992b6fcda92399bf6c65497b9a
humanhash: echo-oranges-nevada-two
File name:wp-keys_php
Download: download sample
Signature ZLoader
File size:494'592 bytes
First seen:2020-07-02 06:31:55 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 3557ba91f384305b69b2bc24cf61dc34 (2 x ZLoader)
ssdeep 12288:Ma5a4LLsVPBl+w1BCY8dGDAHtb3+Wa+k:MarX4Puw1B/kHtb3A+k
Threatray 128 similar samples on MalwareBazaar
TLSH 32B4BF213BE28035F2BF473A69768A318D6DBC8185349DCB67D2654F063B1C2D269F1B
Reporter JAMESWT_WT
Tags:ZLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
99
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Downloader.ZLoader
Status:
Malicious
First seen:
2020-07-01 23:19:00 UTC
File Type:
PE (Dll)
AV detection:
20 of 29 (68.97%)
Threat level:
  3/5
Result
Malware family:
zloader
Score:
  10/10
Tags:
trojan botnet family:zloader evasion spyware
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetThreadContext
Modifies system certificate store
Blacklisted process makes network request
Suspicious use of NtCreateUserProcessOtherParentProcess
Zloader, Terdot, DELoader, ZeusSphinx
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments