MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9edbdfe197acf70216e52d558ff3c076be7b71c67beaa56f0fe06ef769db144e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Ramnit


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 9edbdfe197acf70216e52d558ff3c076be7b71c67beaa56f0fe06ef769db144e
SHA3-384 hash: cdae0fd6b01c2a45a28baefddef23169e5f0038847555342aeaa98fc8abe3054347ee73fd8d467104164fdf5c4c20996
SHA1 hash: 34ccb5143d93a0bf6f0e82ee9734de99b652a0cb
MD5 hash: f4d18a2b4857819ecac822f1ef38fa7c
humanhash: quebec-failed-cold-north
File name:f4d18a2b_by_Libranalysis
Download: download sample
Signature Ramnit
File size:289'148 bytes
First seen:2021-05-05 08:02:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e9924f99c812303f36d72b1772856b4b (19 x Jadtre, 8 x Wapomi, 2 x Worm.Ramnit)
ssdeep 3072:JJw8KYg5zA5GsMYSxSJiN/vGss9kTBf9pAXAtPOYQwRR9JgUCwi9rnVpUC8GHs:J035iMhL/vGsbTBl2wOsR6U9WrnXUC8H
Threatray 1'121 similar samples on MalwareBazaar
TLSH B3545B603DF0C2B6E81120F19279C2ABAD6A386D15D6F5476F870F74CF58B82E679348
Reporter Libranalysis
Tags:ramnit


Avatar
Libranalysis
Uploaded as part of the sample sharing project

Intelligence


File Origin
# of uploads :
1
# of downloads :
1'157
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Creating a process from a recently created file
Creating a window
Launching a process
Sending a UDP request
Searching for the window
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Worm.Ramnit
Status:
Malicious
First seen:
2020-05-06 19:32:00 UTC
AV detection:
29 of 29 (100.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Loads dropped DLL
Executes dropped EXE
UPX packed file
Unpacked files
SH256 hash:
651daeb74b3db45de21b0a82ad2b70288c605127d054a67ea32bf457206582e1
MD5 hash:
d99706fead4e925acccb4bf0094f7ad8
SHA1 hash:
faa8194211076b33f247a3037eb4cfc4661bc3d7
SH256 hash:
9edbdfe197acf70216e52d558ff3c076be7b71c67beaa56f0fe06ef769db144e
MD5 hash:
f4d18a2b4857819ecac822f1ef38fa7c
SHA1 hash:
34ccb5143d93a0bf6f0e82ee9734de99b652a0cb
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments