MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 61ee3bd82bed03dd0f3fb9bc9b76b7da972a90d3c12c8e4d5e967440a2f04c00. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 61ee3bd82bed03dd0f3fb9bc9b76b7da972a90d3c12c8e4d5e967440a2f04c00
SHA3-384 hash: b0f6277f556d844b781b4c438ddc5191b1d101a4a2d89779cf2417aa536e2b6aded9cfdbc41ce1a47d739e620e7e1de3
SHA1 hash: d3fa355cc1d184be20b441143fa34e4ae1a4bdb2
MD5 hash: 14eefb80a0813abbf8710387a5383f08
humanhash: lactose-quebec-spaghetti-twelve
File name:AIDS_NT.exe
Download: download sample
File size:947'003 bytes
First seen:2020-09-04 10:40:36 UTC
Last seen:2025-05-06 11:44:27 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 12288:/GqN/XdctpVtkkKICgvDkBLab3Xldfr4oSsFsA0cO4KfRErkYzWaMSDncS:pNcBtkUHf9ace3sJTcS
TLSH 1D15BE06BE619933C02277310921F73997B92FD0BA21C386F6FC2E9BBB16A465D351D1
Reporter cocaman
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
82
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Creating a file in the %temp% subdirectories
Running batch commands
Sending a UDP request
Creating a file in the Windows directory
Launching a process
Creating a file
Creating a process from a recently created file
Launching the process to interact with network services
Windows shutdown
Setting a prohibition to launch some applications
Changing the Windows explorer settings
Enabling autorun with the shell\open\command registry branches
Blocking the System Restore
Blocking a possibility to launch for cmd.exe command interpreter
Blocking a possibility to launch for the Windows Task Manager (taskmgr)
Blocking a possibility to launch for the Windows registry editor (regedit.exe)
Enabling autorun
Threat name:
Win32.Ransomware.Encoder
Status:
Malicious
First seen:
2020-09-02 23:04:55 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion persistence ransomware bootkit
Behaviour
Modifies Control Panel
Modifies registry class
Runs net.exe
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Modifies Control Panel
Modifies data under HKEY_USERS
Modifies registry class
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Drops file in Windows directory
Drops file in Windows directory
Sets desktop wallpaper using registry
Sets desktop wallpaper using registry
Modifies WinLogon
Modifies WinLogon
Loads dropped DLL
Blocks application from running via registry modification
Disables RegEdit via registry modification
Disables Task Manager via registry modification
Disables use of System Restore points
Executes dropped EXE
Sets file to hidden
Blocks application from running via registry modification
Disables RegEdit via registry modification
Disables Task Manager via registry modification
Disables use of System Restore points
Executes dropped EXE
Modifies WinLogon to allow AutoLogon
Sets file to hidden
Modifies WinLogon for persistence
Modifies system executable filetype association
Modifies WinLogon for persistence
Modifies system executable filetype association
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Executable exe 61ee3bd82bed03dd0f3fb9bc9b76b7da972a90d3c12c8e4d5e967440a2f04c00

(this sample)

Comments