URLhaus Database

URLhaus tries to identify the malware associated with the payload served by a certain malware URL. In case URLhaus is able to identify the associated malware family, the payload will be tagged accordingly (field signature). The page below gives you an overview on payloads that URLhaus has identified as Rootkit.ZeroAccess.

Database Entry


Signature:Rootkit.ZeroAccess
Firstseen:2018-03-27 05:49:49 UTC
Lastseen:2019-07-10 09:38:02 UTC
Unique Payloads:4
URLs:3

Payload


The table below shows all payloads that have been identified as Rootkit.ZeroAccess.

Firstseen (UTC)SHA256File TypeFile sizeVT
2019-07-10 09:38:02ff20304239649f7e1f21dfed86e70171da6af8ef0964bf95b3f3c3a4eb11b47bExecutable exe341'370Virustotal results 45 / 69 (65.22)
2019-03-20 21:25:2169e966e730557fde8fd84317cdef1ece00a8bb3470c0b58f3231e170168af169Executable exe252'928Virustotal results 56 / 64 (87.50)
2018-04-03 09:08:411e9cadfc11f4690d2b7d96553c8740345bbba8b9307e03d0968620fa6b768ea9Executable exe13'824Virustotal results 41 / 66 (62.12)
2018-03-27 05:49:491e9cadfc11f4690d2b7d96553c8740345bbba8b9307e03d0968620fa6b768ea9Executable exe13'824Virustotal results 29 / 67 (43.28)

Number of entries displayed: 4 (max: 1'000)