top title background image
flash

zloader_1.8.0.0.exe

Status: finished
Submission Time: 2020-07-19 21:30:35 +02:00
Malicious
E-Banking Trojan
Trojan
Spyware
Evader
ZeusVM

Comments

Tags

  • zloader

Details

  • Analysis ID:
    247331
  • API (Web) ID:
    390297
  • Analysis Started:
    2020-07-20 03:15:49 +02:00
  • Analysis Finished:
    2020-07-20 03:31:01 +02:00
  • MD5:
    8211a69a3a068265e8b9ab03e4546581
  • SHA1:
    e4e520c3ae68ab2ed566d1f090ef0dc5c8003b0e
  • SHA256:
    f6c6a59c54373d9a49e7a5a7aa859d6bda9f5826e4bb652f5898fa78c8748f39
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 54/72
malicious
Score: 20/41
malicious
Score: 26/44
malicious

IPs

IP Country Detection
1.8.0.0
China
208.100.26.245
United States
85.214.228.140
Germany

Domains

Name IP Detection
xowxlitqhrhffcmg.com
208.100.26.245
gn01.indvshid.com
0.0.0.0
ugqdfaquwqtrgmjx.com
85.214.228.140

URLs

Name Detection
http://xowxlitqhrhffcmg.com/AX01.php
http://%s/%s.php
http://fontfabrik.com
Click to see the 37 hidden entries
http://www.founder.com.cn/cn
http://cert.int-x3.letsencrypt.org/07
http://www.openssl.org/support/faq.html....................
https://xowxlitqhrhffcmg.com/AX01.phpJ
http://ns.ado
http://www.jiyu-kobo.co.jp/
https://xowxlitqhrhffcmg.com/
http://www.founder.com.cn/cn/cThe
http://www.%s.comPA
http://www.fonts.com
http://www.sandoll.co.kr
http://www.zhongyicts.com.cn
https://%s/%s.phphttp://%s/%s.phpSoftware
http://www.sakkal.com
http://ugqdfaquwqtrgmjx.com/AX01.php
http://cps.root-x1.letsencrypt.org0
https://xowxlitqhrhffcmg.com/AX01.phpSL
http://www.tiro.com
http://www.apache.org/licenses/LICENSE-2.0
http://www.founder.com.cn/cn/bThe
https://gn01.indvshid.com/cpp/al.phpq
http://cps.letsencrypt.org0
https://gn01.indvshid.com/cpp/al.php
https://gn01.indvshid.com/
https://%s/%s.php
http://ocsp.int-x3.letsencrypt.org0/
http://ugqdfaquwqtrgmjx.com/AX01.php0
https://xowxlitqhrhffcmg.com/AX01.phpd
https://xowxlitqhrhffcmg.com/AX01.php
https://xowxlitqhrhffcmg.com/AX01.phpr
http://www.goodfont.co.kr
https://gn01.indvshid.com/cpp/al.phpm
http://www.carterandcone.coml
http://www.openssl.org/support/faq.html
http://www.sajatypeworks.com
http://www.typography.netD
http://xowxlitqhrhffcmg.com/AX01.phpW

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\Piowoz\udgeu.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\Piowoz\udgeu.exe:Zone.Identifier
data
#
C:\Users\user\AppData\Roaming\Ruefpu\yxbak.oma
data
#