Detection Content: Malspam Downloads Zloader Malware

Zloader Trojan (also known as Zeus Sphinx and Terdot) was initially spotted in August 2015. It is based on the Zeus v2 Trojan’s leaked source code and cybercriminals used it in attacks on financial organizations across the globe collecting sensitive data via web injections. In early 2018, the use of this banking Trojan in the wild faded away, but in December last year, attackers started using it again, and since then, researchers have already discovered 25 fresh versions of Zloader.

Researchers at Proofpoint spotted 100+ campaigns since January 2020 that were targeted at users in the United States, Canada, Germany, Poland, and Australia. Adversaries use different fraudulent email lures, but for the last two months, they give pride of place to COVID-19 scam prevention tips, COVID-19 testing, and invoices. The new version of the trojan is less sophisticated as code obfuscation and string encryption are missing, as well as a few other advanced features the Trojan had in 2018. Recently released community Sigma rule by Emir Erdogan helps your security solution to discover Zloader malware with the help of sysmon logs:


The rule has translations for the following platforms:

SIEM: Azure Sentinel, ArcSight, QRadar, Splunk, Graylog, Sumo Logic, ELK Stack, RSA NetWitness, Logpoint, Humio

EDR: Carbon Black, Elastic Endpoint



Tactics: Defense Evasion, Discovery

Techniques: Modify Registry (T1112), Query Registry (T1012)


More rules to detect this malware:

XLS Document Downloads Zloader DLL by Emir Erdogan –

Zloader RAT detection by Ariel Millahuel –

Terdot Trojan by Ariel Millahuel –

Was this article helpful?

Like and share it with your peers.
Join SOC Prime's Detection as Code platform to improve visibility into threats most relevant to your business. To help you get started and drive immediate value, book a meeting now with SOC Prime experts.

Related Posts