MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 211abb81c05810e3f08608a7035e8c4c3337de419e63257b4c3e4a1d2669aec5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 2


Intelligence 2 IOCs YARA 1 File information Comments

SHA256 hash: 211abb81c05810e3f08608a7035e8c4c3337de419e63257b4c3e4a1d2669aec5
SHA3-384 hash: 42d838d0a35f2daa175a16bf4cc30521c2deafe86ebadffa82fb8b19a24f3b4908ef9aa5dbb82a6aea922e5477715cfd
SHA1 hash: ffa7a76b1972d30012e199a5bbc3aa9f23a4c8fb
MD5 hash: 174e51ecf2394ddf03ca80b5bea85360
humanhash: jig-fillet-east-alabama
File name:211abb81c05810e3f08608a7035e8c4c3337de419e63257b4c3e4a1d2669aec5
Download: download sample
File size:960'000 bytes
First seen:2020-06-03 09:04:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 332bd1856fa33aab7ffaf1cf0cd85670
ssdeep 24576:UBXUwbea6lexCL1chHrByK/PslZJL4iXRuSM/:YPCa6QxCZgH3HyZRfXASi
Threatray 29 similar samples on MalwareBazaar
TLSH C41533AE94510CF4FC274F388857F33C217D0ED4DAB989A794D871788DA2C787615A4B
Reporter raashidbhatt
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
63
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Clipbanker
Status:
Malicious
First seen:
2020-06-03 05:57:38 UTC
AV detection:
19 of 30 (63.33%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
vmprotect
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Drops startup file
Loads dropped DLL
Executes dropped EXE
VMProtect packed file
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments