MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 da550540689b015b44a2e03f37c23ed8c8730ccf9cb611490dc76a39782dce2b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara 1 Comments

SHA256 hash: da550540689b015b44a2e03f37c23ed8c8730ccf9cb611490dc76a39782dce2b
SHA3-384 hash: b3c60e2451b98b8732c179f176ac9df9990f55029b168236e2fd0994fdb5adc92158c460e938f2ff79fddb29405671c5
SHA1 hash: d3895f0e4116c045c4e13ea478643e64b1ebf12d
MD5 hash: 7d8bb43c8776981c2c75313cf67175f0
humanhash: india-colorado-artist-cold
File name:zloader 2_1.1.20.0.vir
Download: download sample
Signature ZLoader
File size:588'800 bytes
First seen:2020-07-19 17:29:22 UTC
Last seen:2020-07-19 19:22:33 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4df3a9dfe0145aa4564e0be4845d7ea7
ssdeep 12288:lhE9E6c13D3071+0P6Qg2HVy86CL3zB+8B7Gd95Xjd5:Sc1T30x+Fz2HVySZho95T
TLSH D5C449127D61C531D0292338CD4ADAF80445BD2ADF6D865735EA7F4F7EBA38214B092E
Reporter @tildedennis
Tags:ZLoader zloader 2


Twitter
@tildedennis
zloader 2 version 1.1.20.0

Intelligence


File Origin
# of uploads :
3
# of downloads :
19
Origin country :
FR FR
Mail intelligence
No data
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Threat name:
Win32.Trojan.Cridex
Status:
Malicious
First seen:
2020-03-11 22:11:14 UTC
AV detection:
22 of 31 (70.97%)
Threat level
  5/5
Result
Malware family:
zloader
Score:
  10/10
Tags:
persistence trojan botnet family:zloader
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Zloader, Terdot, DELoader, ZeusSphinx
Threat name:
Unknown
Score:
1.00

Yara Signatures


Rule name:win_zloader_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ZLoader

Executable exe da550540689b015b44a2e03f37c23ed8c8730ccf9cb611490dc76a39782dce2b

(this sample)

Comments