MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e3e1334530a63bb70e51fdd7c28ad51bfcdff8022d393a8dbbd6a398e90ff12c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: e3e1334530a63bb70e51fdd7c28ad51bfcdff8022d393a8dbbd6a398e90ff12c
SHA3-384 hash: 6bab0ad20fceea006cf1f7cb382dd95b3dd4d109fdb2a933a0288e5683117bff271e10d467087cc355b8911ee29bfd72
SHA1 hash: 4881a85b7531ed2211e0c722a5bb1c9e9c522c54
MD5 hash: 0f09d8d3edf0e06e79fb15df680be3ac
humanhash: jupiter-whiskey-lion-july
File name:vmzeus_3.2.3.1.vir
Download: download sample
Signature VMZeuS
File size:285'889 bytes
First seen:2020-07-19 19:24:41 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 604d450895afc24d246f7c803bd35866
ssdeep 6144:SMbOw2FeXh1gD1o6mfjekb2QH/r+6v8wLKvze:BKWh1gD1RidKQHT38w2vi
TLSH 3754F16FA99C51A7E137C2F7A4C073CB920AE97362561D1A28C64B8D7A76143BD4330F
Reporter @tildedennis
Tags:vmzeus


Twitter
@tildedennis
vmzeus version 3.2.3.1

Intelligence


File Origin
# of uploads :
1
# of downloads :
18
Origin country :
US US
Mail intelligence
No data
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Connection attempt to an infection source
Result
Threat name:
ZeusVM
Detection:
malicious
Classification:
bank.troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 247280 Sample: vmzeus_3.2.3.1.vir Startdate: 20/07/2020 Architecture: WINDOWS Score: 100 49 cdn.onenote.net 2->49 63 Antivirus / Scanner detection for submitted sample 2->63 65 Multi AV Scanner detection for submitted file 2->65 67 Detected ZeusVM e-Banking Trojan 2->67 69 3 other signatures 2->69 10 vmzeus_3.2.3.1.exe 1 2->10         started        14 Mozillaxpers.exe 1 2->14         started        16 Mozillaxpers.exe 1 2->16         started        signatures3 process4 dnsIp5 51 3.2.3.1 AMAZON-02US United States 10->51 87 Detected unpacking (changes PE section rights) 10->87 89 Detected unpacking (overwrites its own PE header) 10->89 91 Detected ZeusVM e-Banking Trojan 10->91 95 2 other signatures 10->95 18 vmzeus_3.2.3.1.exe 2 10->18         started        93 Injects a PE file into a foreign processes 14->93 22 Mozillaxpers.exe 14->22         started        24 Mozillaxpers.exe 16->24         started        signatures6 process7 file8 45 C:\Users\user\AppData\...\Mozillaxpers.exe, PE32 18->45 dropped 47 C:\Users\user\AppData\...\tmp70830902.bat, DOS 18->47 dropped 71 Drops executable to a common third party application directory 18->71 73 Tries to detect sandboxes / dynamic malware analysis system (registry check) 18->73 75 Tries to detect sandboxes / dynamic malware analysis system (mutex check) 18->75 26 Mozillaxpers.exe 1 18->26         started        29 cmd.exe 1 18->29         started        77 Tries to detect sandboxes / dynamic malware analysis system (tool check) 22->77 signatures9 process10 signatures11 79 Antivirus detection for dropped file 26->79 81 Detected unpacking (changes PE section rights) 26->81 83 Detected unpacking (overwrites its own PE header) 26->83 85 2 other signatures 26->85 31 Mozillaxpers.exe 1 12 26->31         started        35 conhost.exe 29->35         started        process12 dnsIp13 53 babybumred.com 31->53 55 Creates autostart registry keys with suspicious names 31->55 57 Maps a DLL or memory area into another process 31->57 59 Creates a thread in another existing process (thread injection) 31->59 61 3 other signatures 31->61 37 aDzGgOORDjIppKLq.exe 31->37 injected 39 aDzGgOORDjIppKLq.exe 31->39 injected 41 aDzGgOORDjIppKLq.exe 31->41 injected 43 13 other processes 31->43 signatures14 process15
Threat name:
Win32.Trojan.Zbot
Status:
Malicious
First seen:
2013-08-30 17:01:00 UTC
AV detection:
24 of 25 (96.00%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
evasion persistence
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of FindShellTrayWindow
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Adds Run key to start application
Deletes itself
Identifies Wine through registry keys
Loads dropped DLL
Identifies Wine through registry keys
Executes dropped EXE
Executes dropped EXE
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments