MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4fbe77777093608a25b248db192e96bb062da46835e2739c07922c39cfbb0d57. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 6
| SHA256 hash: | 4fbe77777093608a25b248db192e96bb062da46835e2739c07922c39cfbb0d57 |
|---|---|
| SHA3-384 hash: | ad65e98dc8c6b65fee2c94a29a4da616d5c1bd12b649005a28ca521a455894fb7762f4436019806bfcb556fe01d6e16e |
| SHA1 hash: | 4c36f965ba398bfde3ddf4ea1274405c85ffccab |
| MD5 hash: | 7ba4f48b89a9d8441de3e3291ab40907 |
| humanhash: | wisconsin-california-three-pennsylvania |
| File name: | Invoice Payment Copy.cmd |
| Download: | download sample |
| File size: | 548'864 bytes |
| First seen: | 2020-08-18 19:16:54 UTC |
| Last seen: | 2020-08-18 20:11:51 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 849887af87d3c5a3505d23d8b15e02ce |
| ssdeep | 12288:Luv+XyDHRqUaa46A9jmP/uhu/yMS08CkntxYRS:av0wHROfmP/UDMS08Ckn3P |
| Threatray | 583 similar samples on MalwareBazaar |
| TLSH | 99C49D13EB20B11EE953C4B16C65826E1A197EB60295AE07BFC59F0934726D3B9F031F |
| Reporter | |
| Tags: | cmd |
abuse_ch
Malspam distributing unidentified malware:HELO: pro152-34.mxout.rediffmailpro.com
Sending IP: 119.252.152.34
From: Perfect Tubes Ltd <deepak.naik@perfecttubes.com>
Subject: We Have Remitted Your Invoice Payment
Attachment: Invoice_Payment_Copy.zip (contains "Invoice Payment Copy.cmd")
Intelligence
File Origin
# of uploads :
2
# of downloads :
79
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Sending a UDP request
Creating a window
Using the Windows Management Instrumentation requests
Running batch commands
Creating a process with a hidden window
Creating a file
Searching for the window
Deleting a recently created file
Replacing files
Threat name:
Win32.Trojan.SpyAgent
Status:
Malicious
First seen:
2020-08-18 19:18:09 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 573 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
1/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Password Stealer
Score:
0.90
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
exe 4fbe77777093608a25b248db192e96bb062da46835e2739c07922c39cfbb0d57
(this sample)
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.