MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 b2db0dad3f1acb31633bc8d135453b5141d75ce89212a303a9148a40f60eb917. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 6
| SHA256 hash: | b2db0dad3f1acb31633bc8d135453b5141d75ce89212a303a9148a40f60eb917 |
|---|---|
| SHA3-384 hash: | 694a19bd5af65f6f2827bb003615f1a293b6e6da22d1327c2e26b0e68cb04924557422f49bc13a1954eedcb7107234a5 |
| SHA1 hash: | f1056fb198e27b567d46c3fe7b2d355c925988fd |
| MD5 hash: | d554b4c1aa278eeaf10def8ea5973cd6 |
| humanhash: | black-hawaii-alanine-carolina |
| File name: | PAYMENT FROM OUR SBI BANK.cmd |
| Download: | download sample |
| File size: | 548'864 bytes |
| First seen: | 2020-08-18 12:28:24 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 849887af87d3c5a3505d23d8b15e02ce |
| ssdeep | 12288:0uv+XyDHRqUaW46A9jmP/uhu/yMS08CkntxYRS:rv0wHROfmP/UDMS08Ckn3P |
| Threatray | 15 similar samples on MalwareBazaar |
| TLSH | 49C49D13EB20B11EE953C4B16C65826E1A197EB60295AE07BFC59F0934726D3B9F031F |
| Reporter | |
| Tags: | cmd |
abuse_ch
Malspam distributing unidentified malware:HELO: pro152-51.mxout.rediffmailpro.com
Sending IP: 119.252.152.33
From: Perfect Tubes Ltd <deepak.naik@perfecttubes.com>
Subject: We have transferred an amount of Rs.11,98,733/-
Attachment: PAYMENT_FROM_OUR_SBI_BANK.zip (contains "PAYMENT FROM OUR SBI BANK.cmd")
Intelligence
File Origin
# of uploads :
1
# of downloads :
73
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Using the Windows Management Instrumentation requests
Running batch commands
Creating a process with a hidden window
Creating a file
Searching for the window
Deleting a recently created file
Replacing files
Sending a UDP request
Threat name:
Win32.Trojan.SpyAgent
Status:
Malicious
First seen:
2020-08-18 03:09:02 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 5 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
1/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Password Stealer
Score:
0.90
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
exe b2db0dad3f1acb31633bc8d135453b5141d75ce89212a303a9148a40f60eb917
(this sample)
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.