MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3c5ef5423e281a468e9f0381327a9635f20626a98054e769fc08dd4270db01e4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 3c5ef5423e281a468e9f0381327a9635f20626a98054e769fc08dd4270db01e4
SHA3-384 hash: 383eff7c79d164210f88fe36e68e1b71c1f7b87727b02c2c79c0c98fe3871376ef78cbb89a12824c563fac8694ba683d
SHA1 hash: 0a1c35f9dbc363be59988ff3e4ba23068a02d478
MD5 hash: 3cb00a681f5043794a10b9d713dedde4
humanhash: november-leopard-carolina-charlie
File name:wydipeq.msi.exe
Download: download sample
File size:696'320 bytes
First seen:2020-07-01 19:12:45 UTC
Last seen:2020-07-01 19:49:37 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 3dbf6c2cd2886e109ef90dcce86638b7 (5 x FormBook, 1 x NetWire, 1 x RemcosRAT)
ssdeep 12288:Qe7+LHvP79bjBoxHyzKXAzgqGD4CdCIJuxd6Ur5IScz5ISF+gAuA1KzqrRUyqqjb:/q779bjBoAzKXAPC4BYX/ebP2Gcjc
Threatray 5'248 similar samples on MalwareBazaar
TLSH AAE4CF21B7D0953BDD5B1BB48C0F6AA86C267DA02E99584F3AF80CCE6B7D361342D153
Reporter James_inthe_box
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
78
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-06-30 19:10:53 UTC
File Type:
PE (Exe)
Extracted files:
31
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
spyware persistence
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: MapViewOfSection
Suspicious use of SendNotifyMessage
Modifies Internet Explorer settings
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of SendNotifyMessage
Enumerates system info in registry
Modifies Internet Explorer settings
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Adds Run entry to start application
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Legitimate hosting services abused for malware hosting/C2
Adds Run entry to start application
Reads user/profile data of web browsers
Reads user/profile data of web browsers
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments