MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 67552169347f8a5d42ec9f8413f3ed7258310286e22b8aa44f094e3a7723f82e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 67552169347f8a5d42ec9f8413f3ed7258310286e22b8aa44f094e3a7723f82e
SHA3-384 hash: 1e186e540d95a1052cba532b34829792d93d37c653b95b4424ee0186da5f363cf0ad7939a7e1938c578b7991ed83784f
SHA1 hash: e62048ad2a7cce89cbd475d32b4b0053b06eaec8
MD5 hash: b995a31258b6aefc28c511860a2409cf
humanhash: undress-skylark-artist-pizza
File name:6uV2kj1ESIvvG7u.exe
Download: download sample
File size:278'016 bytes
First seen:2020-08-19 09:20:00 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 6144:oyceS4EcmZHyXFaxmVmie9bngP6687lfgn22k8mSvCdIR3XSHVtp0G+6:ozeS4EcmZHAFaxmVmie9bngP6v7UkbSz
Threatray 60 similar samples on MalwareBazaar
TLSH 1144AE5C34A0B1AFE6E98DB5A8645C344762332F020FFE078953A5E457DDAE3EE440A7
Reporter abuse_ch
Tags:exe


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: n1.iactive.co.za
Sending IP: 196.15.191.20
From: nats@iactive.co.za
Subject: Proof of Payment
Attachment: Proof Of Payment.UUE (contains "6uV2kj1ESIvvG7u.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
67
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
n/a
Score:
25 / 100
Signature
a
c
d
e
f
g
h
i
L
M
n
o
p
r
s
t
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 271091 Sample: 6uV2kj1ESIvvG7u.exe Startdate: 19/08/2020 Architecture: WINDOWS Score: 25 12 cdn.onenote.net 2->12 16 Machine Learning detection for sample 2->16 7 6uV2kj1ESIvvG7u.exe 2 2->7         started        signatures3 process4 process5 9 WerFault.exe 23 9 7->9         started        dnsIp6 14 192.168.2.1 unknown unknown 9->14
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-08-19 09:21:06 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Program crash
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe 67552169347f8a5d42ec9f8413f3ed7258310286e22b8aa44f094e3a7723f82e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments