ZLib

Malware updated 2 months ago (2024-08-19T09:17:40.982Z)
Download STIX
Preview STIX
Zlib is a piece of malware, a harmful program designed to exploit and damage computer systems. It can infiltrate systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or even hold data hostage for ransom. Zlib has been associated with various types of malware infections, notably the Snake infection. In such cases, whenever an Item Type of 0x01 is seen within the 0x3 Container, the file is always identified as the Zlib library. The malware has been linked to several vulnerabilities over time. For instance, the CVE-2018-25032 vulnerability was addressed in an update that fixed memory corruption on deflate (bsc#1197459). Similarly, another issue related to libxml2 (bsc#1203652) was resolved in a subsequent update. The procps update also improved memory handling and ensured the correct library version was installed (bsc#1206412). Despite these fixes, Zlib continues to pose a threat due to its association with other malware. Zlib has been utilized by various malicious software for different purposes. For example, SweetSpecter uses zlib to send compressed TCP packets to the command and control server, emulating Gh0st RAT's known communication scheme. Both LunarWeb and LunarMail use a statically linked zlib library for compressing collected data. The SimpleRemoter and Dinodas RAT share similarities, including the usage of the same zlib library version 1.2.11, indicating overlaps in their code. Lastly, NSPX30 plugins use zlib to compress collected information, demonstrating the widespread use of this malware in cyber threats.
Description last updated: 2024-08-19T09:15:35.182Z
What's your take? (Question 1 of 4)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Payload
Malware
Loader
Rat
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The Snake Threat Actor is associated with ZLib. Snake, also known as EKANS, is a significant threat actor that emerged in the cybersecurity landscape in early 2020. Initially detected by Dragos on January 6, 2020, Snake has been identified as a new variant of ransomware targeting business networks. The malware was initially developed for Windows Unspecified
2
Source Document References
Information about the ZLib Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
SANS ISC
2 months ago
CERT-EU
7 months ago
Unit42
5 months ago
ESET
5 months ago
Checkpoint
6 months ago
ESET
8 months ago
ESET
8 months ago
Unit42
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
SecurityIntelligence.com
a year ago
CERT-EU
a year ago
MITRE
2 years ago
MITRE
2 years ago
MITRE
2 years ago
CISA
a year ago
CERT-EU
a year ago
MITRE
2 years ago
CERT-EU
a year ago
CERT-EU
2 years ago