MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 843ae5d44ada9651a6e8253759a53bafca37cb1b7c09544b1d56370269564c91. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ItsSoEasy


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: 843ae5d44ada9651a6e8253759a53bafca37cb1b7c09544b1d56370269564c91
SHA3-384 hash: b13458e083b9dc84c97d0fc21541a598773a2f42e4b5eb7d3b90d7e1eaf6364415ee5c82c153aa65d00e66e34a978c09
SHA1 hash: 3b8721d2616935b9c894c402627c7daac8648e3d
MD5 hash: cc4b569616b52d117a17101deeddbd9a
humanhash: table-don-five-nineteen
File name:itssoeasy_win_c_v2.exe1
Download: download sample
Signature ItsSoEasy
File size:1'411'308 bytes
First seen:2023-04-17 12:14:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f4db26c591b09968aa58f5f2678ce365 (1 x ItsSoEasy)
ssdeep 24576:ScmGCbJvInn6Tcgik8SQTEJyXmC5uee+r7tP16FdiNn0HG+Po5YNn:NmG4rSJrpXmC5uM7tP16FYNn2PoKNn
Threatray 47 similar samples on MalwareBazaar
TLSH T1CD658C9064A49C8EEE5877BCC9E78723377C7B9057B797030A24A9760C36AC53EE2714
TrID 51.0% (.EXE) UPX compressed Win64 Executable (70117/5/12)
19.6% (.EXE) UPX compressed Win32 Executable (27066/9/6)
12.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
7.6% (.EXE) Win64 Executable (generic) (10523/12/4)
3.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter Anonymous
Tags:educational exe itssoeasy Ransomware


Avatar
Anonymous
ItsSoEasy Educational Ransomware PoC

Intelligence


File Origin
# of uploads :
1
# of downloads :
631
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
itssoeasy_win_c_v2.exe1
Verdict:
No threats detected
Analysis date:
2023-04-17 12:16:44 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Searching for the window
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug filecoder overlay packed spyeye
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
expl.evad
Score:
64 / 100
Signature
Drops script or batch files to the startup folder
Found API chain indicative of debugger detection
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 848067 Sample: itssoeasy_win_c_v2.exe1.exe Startdate: 17/04/2023 Architecture: WINDOWS Score: 64 26 Multi AV Scanner detection for submitted file 2->26 28 Sigma detected: Drops script at startup location 2->28 7 itssoeasy_win_c_v2.exe1.exe 3 2->7         started        12 cmd.exe 1 2->12         started        process3 dnsIp4 24 192.168.56.109, 6666 unknown unknown 7->24 22 C:\Users\user\AppData\Roaming\...\kill.bat, ASCII 7->22 dropped 30 Drops script or batch files to the startup folder 7->30 32 Found API chain indicative of debugger detection 7->32 14 conhost.exe 7->14         started        16 itssoeasy_win_c_v2.exe1.exe 1 12->16         started        18 conhost.exe 12->18         started        file5 signatures6 process7 process8 20 conhost.exe 16->20         started       
Threat name:
Win64.Ransomware.CryptoLock
Status:
Malicious
First seen:
2021-11-11 22:22:19 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
19 of 37 (51.35%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
upx
Behaviour
Drops startup file
UPX packed file
Unpacked files
SH256 hash:
c7bff0ed15f0d36f260778e93ef84de52f433a7854c40c21c04af01460199956
MD5 hash:
20d7699546013ff11abd8d897a81c98c
SHA1 hash:
f91b7ef4a8a1439598527eff3b49ac13c2687174
SH256 hash:
843ae5d44ada9651a6e8253759a53bafca37cb1b7c09544b1d56370269564c91
MD5 hash:
cc4b569616b52d117a17101deeddbd9a
SHA1 hash:
3b8721d2616935b9c894c402627c7daac8648e3d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments