MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fa4b250a594d746f135c06cd5a8ae9b544fb143c86e77f14add777c54f59e21b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ZeuS


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments

SHA256 hash: fa4b250a594d746f135c06cd5a8ae9b544fb143c86e77f14add777c54f59e21b
SHA3-384 hash: b8ce07a54c63d938bbd61276dd191cfbc9036b329790214f873e2bc0bdf61aaf933118343f2b56d907237c909f3180ae
SHA1 hash: 86ca91071680ca8b2ee42ba3d0d664d2dfd9ab96
MD5 hash: 209c148cf6e1f4a7f3159b4e135b5980
humanhash: monkey-arizona-nitrogen-coffee
File name:fa4b250a594d746f135c06cd5a8ae9b544fb143c86e77f14add777c54f59e21b.bin
Download: download sample
Signature ZeuS
File size:321'536 bytes
First seen:2022-03-26 01:30:46 UTC
Last seen:2024-07-24 23:17:04 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5a01928e8568ff143db3a37da1734dc0 (1 x ZeuS)
ssdeep 6144:lBV8n1SvZzGcYV+jrWMuyGfERp3Vk1XHLJDRO6t9vK:l813QrW/y8EL3VED0h
Threatray 5 similar samples on MalwareBazaar
TLSH T14F64122133D05573C0F581329E8797A24E47A426B1AB55EB8C358B579D42F82EB3F38E
File icon (PE):PE icon
dhash icon 4ab96ccc94d17324 (2 x ZeuS)
Reporter tildedennis
Tags:exe prg ZeuS


Avatar
tildedennis
prg version 13

Intelligence


File Origin
# of uploads :
2
# of downloads :
644
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the Windows subdirectories
Launching a service
Loading a system driver
Creating a file
Enabling autorun for a service
Unauthorized injection to a system process
Enabling autorun
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
evasive fingerprint greyware netsh.exe overlay packed stealer
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Ransomware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes memory attributes in foreign processes to executable or writable
Creates an undocumented autostart registry key
Found evasive API chain (may stop execution after checking mutex)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May modify the system service descriptor table (often done to hook functions)
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Zeus
Status:
Malicious
First seen:
2021-10-09 20:47:00 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
33 of 42 (78.57%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
persistence
Behaviour
Checks SCSI registry key(s)
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in System32 directory
Modifies WinLogon for persistence
Unpacked files
SH256 hash:
fa4b250a594d746f135c06cd5a8ae9b544fb143c86e77f14add777c54f59e21b
MD5 hash:
209c148cf6e1f4a7f3159b4e135b5980
SHA1 hash:
86ca91071680ca8b2ee42ba3d0d664d2dfd9ab96
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_gpcode_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.gpcode.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments