MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4320f2599b5f81fb714332fd4c804501dc91d14feec18b42ab0e37def23755de. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 4320f2599b5f81fb714332fd4c804501dc91d14feec18b42ab0e37def23755de
SHA3-384 hash: 90e9ca97539be6d842617f85af0e42536429489c4d8a7e062ee490aed34e1f4b48245ed8ce3d50af90a0cf9f47511b5b
SHA1 hash: 6a2368ef38386437764943997add432cc75c186f
MD5 hash: ddb10196665933567ec2a0deadc84517
humanhash: lamp-lake-double-alanine
File name:24703394900029380043-NFSe.msi
Download: download sample
File size:1'024'512 bytes
First seen:2021-03-04 19:03:59 UTC
Last seen:2021-03-04 19:32:16 UTC
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 24576:NKKY3ZOtkTW5Q9//NzYL0SkIztdfG8NQGatA:NKKYEMXNzYL0pcfNQGaA
Threatray 32 similar samples on MalwareBazaar
TLSH 25258D21B2E6C433D1B60A746D7AE3E9542ABD201F75D49F33D85F0D1E329825932BA3
Reporter ffforward
Tags:banker brazil msi signed

Code Signing Certificate

Organisation:TestCert_2020-8-16_11-22-7
Issuer:TestCert_2020-8-16_11-22-7
Algorithm:sha256WithRSAEncryption
Valid from:2020-08-16T14:12:08Z
Valid to:2021-08-16T14:32:08Z
Serial number: 1afd1491d52f89ba41fa6c0281bb9716
Thumbprint Algorithm:SHA256
Thumbprint: 1cf0b51292549858f263cbb126f859d9d2af8664e3fa07522547e59c49fa65d1
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
ffforward
Brazilian banker, requires Brazilian locale to run.

Intelligence


File Origin
# of uploads :
2
# of downloads :
151
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2021-03-04 15:26:51 UTC
File Type:
Binary (Archive)
Extracted files:
52
AV detection:
2 of 47 (4.26%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Enumerates connected drives
Loads dropped DLL
Blocklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments