MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e17b14b22bfe46a8b9f2c5be411f86c4bee23cf9e7c89755dfc4fefe1620f722. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: e17b14b22bfe46a8b9f2c5be411f86c4bee23cf9e7c89755dfc4fefe1620f722
SHA3-384 hash: 9a1ce7af3e20d46537f5efaac54a1986d291a27f2d008740758b442a0e5b64aaf60908c93154ada316cd2dade1ddbb08
SHA1 hash: 8362c23cbc6b3c479294ae2294371018fa89da07
MD5 hash: b9e7f224dc9c96637a5589dd2e50452c
humanhash: april-connecticut-lactose-wisconsin
File name:zeusaes_2.7.6.1.vir
Download: download sample
Signature ZeuS
File size:135'168 bytes
First seen:2020-07-19 19:45:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 447710c4c9b397f936f36a6b8f4659c8
ssdeep 1536:AfuYfhmb/uJlHPRjqn2wavFWkct68K/+0RAZ70wJYubh7fiLE5YJUl0nqy7MnPXG:C5mbG3vdA2qU1ub1vLcN7XRiDgFj8c
TLSH 34D3019734F18276D7B6EBF69322A22A0535F8EA9933D42E45C03CE4EF705A0DA44731
Reporter @tildedennis
Tags:ZeuS zeusaes


Twitter
@tildedennis
zeusaes version 2.7.6.1

Intelligence


File Origin
# of uploads :
1
# of downloads :
33
Origin country :
FR FR
Mail intelligence
No data
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Threat name:
Win32.Trojan.Zbot
Status:
Malicious
First seen:
2014-07-09 13:43:00 UTC
AV detection:
28 of 31 (90.32%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments