MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 802cdc3920f4f0b3b1c613baa28e009d8c2d8146521baafc950d1723c3ff229b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Casbaneiro


Vendor detections: 4


Intelligence 4 IOCs YARA 2 File information Comments

SHA256 hash: 802cdc3920f4f0b3b1c613baa28e009d8c2d8146521baafc950d1723c3ff229b
SHA3-384 hash: be2fc0b2e0e40301490792b438af3257c024dec462751c89b128c928e0e5c4b6905f390fb393253ae7dc357ba4945e03
SHA1 hash: 1ae19640cb676fcd78d7788e51194fa64a6b7700
MD5 hash: b988203d5205e33a650b73154f2bcbdc
humanhash: thirteen-kansas-lima-cold
File name:luiz.dll
Download: download sample
Signature Casbaneiro
File size:30'738'432 bytes
First seen:2021-02-07 05:44:57 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 115d9d884597c4cd5e5f446e8c21dc6a (1 x Casbaneiro)
ssdeep 786432:loRvAj8gEYxrbjkzYUyApWICy7xBG/QTMod:loRvbobAU+5Ceh
Threatray 1 similar samples on MalwareBazaar
TLSH 8E67F26372C9653EC05F0A3A583BA684983F7B713A168C5BA7F40C8C8F755407E39A5B
Reporter johnk3r
Tags:banker casbaneiro

Intelligence


File Origin
# of uploads :
1
# of downloads :
142
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Launching a process
Sending a UDP request
Result
Verdict:
UNKNOWN
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 349613 Sample: luiz.dll Startdate: 07/02/2021 Architecture: WINDOWS Score: 48 15 Multi AV Scanner detection for submitted file 2->15 7 loaddll32.exe 4 2->7         started        process3 process4 9 rundll32.exe 3 7->9         started        11 rundll32.exe 3 7->11         started        process5 13 WerFault.exe 23 9 9->13         started       
Threat name:
Win32.Trojan.Casbaneiro
Status:
Malicious
First seen:
2021-01-06 15:27:10 UTC
AV detection:
15 of 29 (51.72%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
ransomware
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Adsterra_Adware_DOM
Author:IlluminatiFish
Description:Detects Adsterra adware script being loaded without the user's consent
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Casbaneiro

DLL dll 802cdc3920f4f0b3b1c613baa28e009d8c2d8146521baafc950d1723c3ff229b

(this sample)

  
Delivery method
Distributed via web download

Comments