MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 03bd2e000f7901a07affedeac4d001a701bb3b1d6f332cde9314d156cc7689ac. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 03bd2e000f7901a07affedeac4d001a701bb3b1d6f332cde9314d156cc7689ac
SHA3-384 hash: d50d853a55eada320d1a86ec5a2b55d166f7024e5843428751008292f608983e852f97467663470d9d30bdb9e1098072
SHA1 hash: dd26c30b2674ba4aa984ee3845045d266ac2a755
MD5 hash: d6c8918151f310aac3444047553ef711
humanhash: five-december-delta-november
File name:Payment.exe
Download: download sample
File size:479'232 bytes
First seen:2020-08-18 12:13:49 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:5OLTFaAHn/C2SlEywlvIQAmYjzGqP4K5e9DRvR24EcmZHAFaxmVmie9bngPq5:chFZeQAmYjp3IR24EcmZHAFaxmVmie9M
Threatray 165 similar samples on MalwareBazaar
TLSH 0EA4E04C3090B2AFE9EA4EB6AD541D3447613327421BFF474D63A5E497DDBEAAE00093
Reporter abuse_ch
Tags:exe


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: gokosha.co.jp
Sending IP: 185.222.58.144
From: Jennifer Phuong (Ms) <chan@gokosha.co.jp>
Subject: PO - RFQ # 202055 PO 2020764
Attachment: Payment.zip (contains "Payment.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
65
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Launching a process
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-08-18 00:36:42 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe 03bd2e000f7901a07affedeac4d001a701bb3b1d6f332cde9314d156cc7689ac

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments