MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8fec485e47fd1231aeb1a4107a4918f92c2b15fa66e9171be39a765d26a12acb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BlackRose


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 8fec485e47fd1231aeb1a4107a4918f92c2b15fa66e9171be39a765d26a12acb
SHA3-384 hash: d8d066ec3208f4da2f551934007b77dfc01e1768a590b7a020f616f05bb889527db608df3d946a1bfd92c71979958f2d
SHA1 hash: ba9469854ccca7d00a7b4d8086857638a184f755
MD5 hash: 970773a113d1fc6053fab8f1cc1eec6d
humanhash: vermont-lima-johnny-don
File name:golang ransomware BlackRose
Download: download sample
Signature BlackRose
File size:4'300'800 bytes
First seen:2020-09-08 07:35:25 UTC
Last seen:2020-09-08 09:03:14 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b1be5fe54d4983d7ee773d58fe88d603 (1 x BlackRose)
ssdeep 49152:1J2AvT/tLxkWe2HwnQWaS0qjaNy1ybQYuL5/t7P4EeIJt0mBNlcavHOfHrWIP:nzrkRQfPSag/t7P4JIJqmBnBvH0
TLSH 8C167E12FCA514F9C6FEF234866557227A3238B543317B875F8496792A2AFA47F2D300
Reporter JAMESWT_WT
Tags:BlackRose golang Ransomware


Avatar
JAMESWT_WT
golang ransomware BlackRose

Intelligence


File Origin
# of uploads :
2
# of downloads :
256
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Threat name:
Win64.Ransomware.Snatch
Status:
Malicious
First seen:
2020-09-08 07:37:05 UTC
File Type:
PE+ (Exe)
AV detection:
17 of 29 (58.62%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
JavaScript code in executable
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments