MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d7c1fc3ccb794a45e2d26267ee537ed174773f7d67114e23585e2b2c565257cb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: d7c1fc3ccb794a45e2d26267ee537ed174773f7d67114e23585e2b2c565257cb
SHA3-384 hash: 02690ad58d5069b0f8f9438bfbc4f6411632f0b067cbe10154055e4d0d537e3311eb447b25061a30a5ab5550e3746c9f
SHA1 hash: 31947062310747d6068a52998b50de40dd117288
MD5 hash: 7a816c84601a3766a2b2412c74d65a2d
humanhash: johnny-coffee-harry-network
File name:gameover_0.0.0.20.vir
Download: download sample
Signature ZeuS
File size:262'656 bytes
First seen:2020-07-19 17:26:18 UTC
Last seen:2020-07-19 19:17:34 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9f611945f0fe0109fe728f39aad47024
ssdeep 6144:Kyw+JslMKDmmbAXarHVNSFcQb4fZmqX39xUlIHuTz:/w+JFwAJcQb47XSf
TLSH E544D02664AC2F54D423B274720F1F7955F58B2F3B6A256CEDFE87B2F135A005A2304A
Reporter @tildedennis
Tags:gameover ZeuS


Twitter
@tildedennis
gameover version 0.0.0.20

Intelligence


File Origin
# of uploads :
2
# of downloads :
20
Origin country :
FR FR
Mail intelligence
No data
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Threat name:
Win32.Trojan.Zbot
Status:
Malicious
First seen:
2011-12-18 17:00:00 UTC
AV detection:
30 of 31 (96.77%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
UPX packed file
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments