MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3b6888d30e34ab5f977345c962d76f352483f6138a89079061839af1f553ca18. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Adware.Generic


Vendor detections: 3


Intelligence 3 IOCs YARA 10 File information Comments

SHA256 hash: 3b6888d30e34ab5f977345c962d76f352483f6138a89079061839af1f553ca18
SHA3-384 hash: 4392a991c3a23d80f5a413f369d27aba183dd9be30a39610c32f3121f32ab907ef03ca043a403b15d6149cdb7cf56812
SHA1 hash: 7a2901ebc4eb5fdf7ea6ad87b269fb5f8f14c7d0
MD5 hash: 4218c067f33afee9b1b50b2e9b077b45
humanhash: single-may-summer-yellow
File name:3b6888d30e34ab5f977345c962d76f352483f6138a89079061839af1f553ca18
Download: download sample
Signature Adware.Generic
File size:16'795'835 bytes
First seen:2020-06-03 09:30:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 41d4c56009e4f7c74b5cb4a5919d9f05 (7 x CoinMiner, 1 x Adware.Generic)
ssdeep 196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Threatray 63 similar samples on MalwareBazaar
TLSH 32070222B65084B1D1CA017055FB5B37AAB976190B24F5CFB79CCD6A2F32390EE36319
Reporter raashidbhatt
Tags:Adware.Generic exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Equationdrug
Status:
Malicious
First seen:
2020-06-04 04:29:39 UTC
AV detection:
40 of 48 (83.33%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery evasion persistence upx
Behaviour
Creates scheduled task(s)
Modifies data under HKEY_USERS
Runs net.exe
Runs ping.exe
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Modifies registry class
NSIS installer
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Modifies service
Checks installed software on the system
JavaScript code in executable
Looks up external IP address via web service
Loads dropped DLL
Drops file in Drivers directory
Executes dropped EXE
Modifies Windows Firewall
UPX packed file
Sets file execution options in registry
ServiceHost packer
Suspicious use of NtCreateUserProcessOtherParentProcess
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:APT32_KerrDown
Rule name:ccrewQAZ
Author:AlienVault Labs
Rule name:Choice_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:Datper
Author:JPCERT/CC Incident Response Group
Description:detect Datper in memory
Reference:https://blogs.jpcert.or.jp/en/2017/08/detecting-datper-malware-from-proxy-logs.html
Rule name:Embedded_PE
Rule name:IceID_Bank_trojan
Author:unixfreaxjp
Description:Detects IcedID..adjusted several times
Rule name:mimikatz
Author:Benjamin DELPY (gentilkiwi)
Description:mimikatz
Rule name:Mimikatz_Strings
Author:Florian Roth
Description:Detects Mimikatz strings
Reference:not set
Rule name:Ping_Command_in_EXE
Author:Florian Roth
Description:Detects an suspicious ping command execution in an executable
Reference:Internal Research
Rule name:win_mimikatz_w0
Author:Benjamin DELPY (gentilkiwi)
Description:mimikatz

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments