MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e328b59a03281b6847e8b69c31833e912320972b7653e5824d6c081a356d2a63. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ZLoader


Vendor detections: 8


Intelligence 8 IOCs YARA 4 File information Comments

SHA256 hash: e328b59a03281b6847e8b69c31833e912320972b7653e5824d6c081a356d2a63
SHA3-384 hash: 69668a071a5b3f3ccdf75fda155d05ee528a2c7969d00729b9fe0113128554ed22d58f0af64ee6658b3d0ffb6375cad4
SHA1 hash: b3a7bc04095385d0a7d1722b4cc4e25ad3712e31
MD5 hash: 967fc92dd482ba903c0d5f6e4358d461
humanhash: romeo-neptune-yellow-carpet
File name:oOqVGCp.dll
Download: download sample
Signature ZLoader
File size:515'928 bytes
First seen:2020-10-15 16:41:49 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash e082254dc380c4a5ff641bdad8097f87 (2 x ZLoader)
ssdeep 6144:Pc2z3niEfoPMXLGnQE9NphY64U/jMIuV8RrnFnknZn3nRmn/nlnenvnxnGn5nPYP:fzQPMbGnLphKeMIu6RQ
Threatray 30 similar samples on MalwareBazaar
TLSH E9B4701ABCC04F9FD7AA58B63DA41324169EED0D4761F10F47E4F662E1B0BF2AE90185
Reporter ffforward
Tags:CLXDFYLWWTFMRCBOBM dll sovietzloader ZLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
96
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
88 / 100
Signature
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Creates autostart registry keys with suspicious values (likely registry only malware)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 298835 Sample: oOqVGCp.dll Startdate: 15/10/2020 Architecture: WINDOWS Score: 88 25 fqnceas.su 2->25 27 fqnvtmophfeas.ru 2->27 37 Multi AV Scanner detection for domain / URL 2->37 39 Multi AV Scanner detection for dropped file 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 2 other signatures 2->43 7 loaddll32.exe 1 2->7         started        10 regsvr32.exe 2->10         started        12 regsvr32.exe 2->12         started        signatures3 process4 signatures5 45 Contains functionality to inject code into remote processes 7->45 47 Writes to foreign memory regions 7->47 49 Allocates memory in foreign processes 7->49 14 msiexec.exe 3 25 7->14         started        19 regsvr32.exe 10->19         started        21 regsvr32.exe 12->21         started        process6 dnsIp7 29 fqnvtcpheas.su 14->29 31 fqnvtmophfeas.ru 14->31 33 fqnvsdaas.su 14->33 23 C:\Users\user\AppData\Roaming\...\huixeb.dll, PE32 14->23 dropped 35 Creates autostart registry keys with suspicious values (likely registry only malware) 14->35 file8 signatures9
Threat name:
Win32.Trojan.ZLoader
Status:
Malicious
First seen:
2020-10-15 16:43:05 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
zloader
Score:
  10/10
Tags:
trojan botnet family:zloader persistence
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Blacklisted process makes network request
Zloader, Terdot, DELoader, ZeusSphinx
Malware Config
C2 Extraction:
https://fqnvsdaas.su/gate.php
https://fqnvtcpheas.su/gate.php
https://fqnvtmophfeas.ru/gate.php
https://fqnceas.su/gate.php
https://fqlocpeas.ru/gate.php
https://dksaiijn.ru/gate.php
https://dksafjasnf.su/gate.php
https://fjsafasfsa.ru/gate.php
https://fjskoijafsa.ru/gate.php
https://kochamkkkras.ru/gate.php
Unpacked files
SH256 hash:
e328b59a03281b6847e8b69c31833e912320972b7653e5824d6c081a356d2a63
MD5 hash:
967fc92dd482ba903c0d5f6e4358d461
SHA1 hash:
b3a7bc04095385d0a7d1722b4cc4e25ad3712e31
SH256 hash:
ba829eb9e0e017e243d93231f0dd474412f571e649cbc933b4c998162c99a37c
MD5 hash:
482708c18b165c7575fc9c0c8b5ffc2c
SHA1 hash:
5ece68142bb811ed6ae5bb24b6f751868ffade9e
Detections:
win_zloader_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:win_zloader_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

ZLoader

DLL dll e328b59a03281b6847e8b69c31833e912320972b7653e5824d6c081a356d2a63

(this sample)

Comments