MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 956a4834f9fd06b41877a81e7edb083994d53daae9739fcfb8d4f82203105414. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 2


Intelligence 2 IOCs YARA 1 File information Comments

SHA256 hash: 956a4834f9fd06b41877a81e7edb083994d53daae9739fcfb8d4f82203105414
SHA3-384 hash: f2e347eea6f18e483537e9f1d2fb8d8b8352f590b4823782b5a2736387629d3126a8b62925ada6eddefa5e28a866a91c
SHA1 hash: 5641b16df795a7a07578cdbc9d08f8594228727e
MD5 hash: 45bf4cc532c8bce5a8aa5f30bd6f38e4
humanhash: double-fourteen-burger-uncle
File name:SecuriteInfo.com.Win32.Spy.Agent.PRG.23840
Download: download sample
File size:1'841'152 bytes
First seen:2020-06-14 15:37:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3dcd59ba7c4d1a446b07f7d664363729
ssdeep 24576:AWujyHdrnTaRYpsUGVKh6G3U9SoAfDWfIlMpdw254/CUUn1CU:AWUyH1O1KwG3U9YDW5w2Kq9nI
Threatray 35 similar samples on MalwareBazaar
TLSH 2F85AE12A8028065C966F0F8C0B698A646760D3707A1581762FC7F2DF5BBA57FF1B24F
Reporter SecuriteInfoCom

Intelligence


File Origin
# of uploads :
1
# of downloads :
67
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Spyware.BitWall
Status:
Malicious
First seen:
2020-06-14 15:04:51 UTC
AV detection:
26 of 31 (83.87%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware vmprotect
Behaviour
Delays execution with timeout.exe
Suspicious use of WriteProcessMemory
Looks up external IP address via web service
Deletes itself
Reads user/profile data of web browsers
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 956a4834f9fd06b41877a81e7edb083994d53daae9739fcfb8d4f82203105414

(this sample)

  
Delivery method
Distributed via web download

Comments