MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1936043f5cfcffbee69201b5d3c77696d3a1a017bf401b5093f8f10b27339f86. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CosmicDuke


Vendor detections: 12


Intelligence 12 IOCs YARA 9 File information Comments

SHA256 hash: 1936043f5cfcffbee69201b5d3c77696d3a1a017bf401b5093f8f10b27339f86
SHA3-384 hash: 09138470d6da32dd8bd4bb3b51b5f3b53f8d78814b62b4a93c753bb9fa89a90f90a645e1297dcc0c78cd9d90818f2308
SHA1 hash: 053f8751edaf4f0677d368623c4b9d275e78b513
MD5 hash: 917f9ddebfe98d868094a11da982c641
humanhash: william-don-kilo-nineteen
File name:svchost.exe
Download: download sample
Signature CosmicDuke
File size:2'090'899 bytes
First seen:2025-11-23 09:18:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 98b62dfdc3e59f86e2d70c4065393d47 (1 x CosmicDuke)
ssdeep 12288:Ve6TfPaGw/w+xoJ8D3/5xg1tKwcKJkO01Zj03k/75P:Ve6u/i8D3RSxnAhR
TLSH T1B8A5AE3832D94071E0376178CED6E365D6B6B47117A225DF2BD0867D4F26AE5B338B02
TrID 33.5% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
29.1% (.EXE) UPX compressed Win32 Executable (27066/9/6)
11.3% (.EXE) Win64 Executable (generic) (10522/11/4)
7.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
5.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
Reporter Hexastrike
Tags:CosmicDuke exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
16
Origin country :
IE IE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.9%
Tags:
cosmicduke miniduke
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Creating a file in the Windows subdirectories
Creating a file in the %temp% directory
Moving a file to the %temp% directory
Creating a process from a recently created file
Creating a process with a hidden window
Enabling autorun
Creating a service
Creating a window
Сreating synchronization primitives
Creating a file
Reading critical registry keys
Connection attempt
Enabling autorun for a service
Stealing user critical data
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
adaptive-context cmd expand fingerprint lolbin microsoft_visual_cc overlay packed
Result
Gathering data
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-11-21T08:01:00Z UTC
Last seen:
2025-11-22T06:05:00Z UTC
Hits:
~10
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Dropper.MiniDuke
Status:
Malicious
First seen:
2025-11-21 12:09:07 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
33 of 36 (91.67%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
collection defense_evasion discovery spyware stealer upx
Behaviour
Modifies Control Panel
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_win_path
Program crash
System Location Discovery: System Language Discovery
Drops file in System32 directory
UPX packed file
Accesses Microsoft Outlook profiles
Checks installed software on the system
Enumerates connected drives
Executes dropped EXE
Reads user/profile data of web browsers
Verdict:
Malicious
Tags:
apt Win.Trojan.CosmicDuke-3
YARA:
detect_apt_APT29
Unpacked files
SH256 hash:
1936043f5cfcffbee69201b5d3c77696d3a1a017bf401b5093f8f10b27339f86
MD5 hash:
917f9ddebfe98d868094a11da982c641
SHA1 hash:
053f8751edaf4f0677d368623c4b9d275e78b513
Detections:
win_cosmicduke_w0
SH256 hash:
effb7bd9e04f0bdb75b7f01a666c0f6f5efc0e45e7b042b15c6c1524712d935e
MD5 hash:
fe9e5308745a84a765968806d796b1b9
SHA1 hash:
5e98e45c4d109a005705b3340e110ba5fd907cf0
SH256 hash:
9e3c407d3bbf2a69cf6509994ffb17b45c58c3adaf3dc876b23e7d0575e24ca0
MD5 hash:
38a1745e9ec3bfb9c29b398e6a70f14c
SHA1 hash:
fb3b8f6494b211386381a7e4f6524d3e4643c9e9
Detections:
win_cosmicduke_w0 win_cosmicduke_auto detect_apt_APT29
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CosmicDuke
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:detect_apt_APT29
Author:@malgamy12
Description:detect_APT32_malware
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:UPX20030XMarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
Rule name:win_cosmicduke_w0
Author:@malgamy12
Description:detect cosmicduke

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments