MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4fbe77777093608a25b248db192e96bb062da46835e2739c07922c39cfbb0d57. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 4fbe77777093608a25b248db192e96bb062da46835e2739c07922c39cfbb0d57
SHA3-384 hash: ad65e98dc8c6b65fee2c94a29a4da616d5c1bd12b649005a28ca521a455894fb7762f4436019806bfcb556fe01d6e16e
SHA1 hash: 4c36f965ba398bfde3ddf4ea1274405c85ffccab
MD5 hash: 7ba4f48b89a9d8441de3e3291ab40907
humanhash: wisconsin-california-three-pennsylvania
File name:Invoice Payment Copy.cmd
Download: download sample
File size:548'864 bytes
First seen:2020-08-18 19:16:54 UTC
Last seen:2020-08-18 20:11:51 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 849887af87d3c5a3505d23d8b15e02ce
ssdeep 12288:Luv+XyDHRqUaa46A9jmP/uhu/yMS08CkntxYRS:av0wHROfmP/UDMS08Ckn3P
Threatray 583 similar samples on MalwareBazaar
TLSH 99C49D13EB20B11EE953C4B16C65826E1A197EB60295AE07BFC59F0934726D3B9F031F
Reporter abuse_ch
Tags:cmd


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: pro152-34.mxout.rediffmailpro.com
Sending IP: 119.252.152.34
From: Perfect Tubes Ltd <deepak.naik@perfecttubes.com>
Subject: We Have Remitted Your Invoice Payment
Attachment: Invoice_Payment_Copy.zip (contains "Invoice Payment Copy.cmd")

Intelligence


File Origin
# of uploads :
2
# of downloads :
79
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Using the Windows Management Instrumentation requests
Running batch commands
Creating a process with a hidden window
Creating a file
Searching for the window
Deleting a recently created file
Replacing files
Threat name:
Win32.Trojan.SpyAgent
Status:
Malicious
First seen:
2020-08-18 19:18:09 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe 4fbe77777093608a25b248db192e96bb062da46835e2739c07922c39cfbb0d57

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments