MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 40e95520d719a9c3277c76b42124de197dc391210b1053fa505897838dcdcb90. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 5
| SHA256 hash: | 40e95520d719a9c3277c76b42124de197dc391210b1053fa505897838dcdcb90 |
|---|---|
| SHA3-384 hash: | 69a21f604804f12bead909a3af4473b3a850ecfe3b964be438bbf105f893ddbe2f7af8b108e87d09df5c53b4a797991d |
| SHA1 hash: | a20fe42241b4e733657d4a39b43342882b106e4e |
| MD5 hash: | 5bc47b9dc1ce0153f04f9712a2fc8654 |
| humanhash: | leopard-hawaii-romeo-april |
| File name: | README.EXE |
| Download: | download sample |
| File size: | 1'255'424 bytes |
| First seen: | 2020-06-10 15:01:23 UTC |
| Last seen: | 2020-06-10 17:53:07 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 70411d486e9bd9bdaaf2d4939bbd54bc (1 x NetWire, 1 x FormBook) |
| ssdeep | 24576:yaXcbtJOhBn2j4byGtIW3n0jlioooooooooooooooo:yaXqO2sby5xioooooooooooooooo |
| Threatray | 75 similar samples on MalwareBazaar |
| TLSH | 23456C22B7914C33C1331A3DDC5B9679E82ABE511A24A8C62BF83D789F75341392D1B7 |
| Reporter | |
| Tags: | exe |
Intelligence
File Origin
# of uploads :
3
# of downloads :
67
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Gathering data
Threat name:
Win32.Trojan.Remcos
Status:
Malicious
First seen:
2020-06-10 15:03:05 UTC
File Type:
PE (Exe)
Extracted files:
47
AV detection:
26 of 31 (83.87%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 65 additional samples on MalwareBazaar
Result
Malware family:
modiloader
Score:
10/10
Tags:
family:modiloader trojan
Behaviour
Suspicious use of WriteProcessMemory
ModiLoader First Stage
ModiLoader, DBatLoader
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
exe 40e95520d719a9c3277c76b42124de197dc391210b1053fa505897838dcdcb90
(this sample)
Delivery method
Other
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.