MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 60b9cde6401ecf9801a24c69f61d155290a580ea053161d215242113a7d3a9d9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 60b9cde6401ecf9801a24c69f61d155290a580ea053161d215242113a7d3a9d9
SHA3-384 hash: f2772e231b44abf0ccad7d802dd4c0caa21d3a314c31acebb05122a952f1692ccd8312555f6e1785a502e26da84dd79f
SHA1 hash: 9f7e01a5bbdbe4d9aec42d44947faf0edee0cfab
MD5 hash: 5bfb529583005db01cf086e5e048aedc
humanhash: xray-colorado-table-april
File name:invoice copy.pdf.exe
Download: download sample
File size:574'976 bytes
First seen:2020-08-18 11:08:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:1m4EcmZHAFaxmVmie9bngPrz8RRkTc1Kuc+CenhDHQiHObo5LHLduthNhmtfPU69:U4EcmZHAFaxmVmie9bngPUrP1Xc+Ceh7
Threatray 70 similar samples on MalwareBazaar
TLSH DBC4F18C34B0B16FE6EA9EB5AC642D3047613327431BFF074D6359E097DEAD29E044A2
Reporter abuse_ch
Tags:exe


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: alkuhaimi.com
Sending IP: 37.48.85.226
From: Financial Manager <rud-division@alkuhaimi.com>
Subject: FW: 回复: paid invoice
Attachment: invoice copy.pdf.z (contains "invoice copy.pdf.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
61
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-08-17 23:37:22 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Program crash
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe 60b9cde6401ecf9801a24c69f61d155290a580ea053161d215242113a7d3a9d9

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments