MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ba739024a4d86294decd11b769dc20bee8fbc9728b17ae35282682114d397c49. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: ba739024a4d86294decd11b769dc20bee8fbc9728b17ae35282682114d397c49
SHA3-384 hash: 1712f358467c08319f379375ccab946913f29f27384aee92158ffba65ef36ac34326d3d234bc734c64077e7be9ce7be6
SHA1 hash: 261d38acab42970a9cddf548b7d40a23c245950d
MD5 hash: 098d769bf0786ef8dfaaec19ad50b35a
humanhash: winter-north-pip-tennis
File name:Order List, specifications.exe
Download: download sample
File size:560'128 bytes
First seen:2020-08-18 11:46:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:+da4EcmZHAFaxmVmie9bngPqpfYy3OhmFrJvCE0CjWS7d+h3iipJJCT:f4EcmZHAFaxmVmie9bngPH1oF9qx
Threatray 171 similar samples on MalwareBazaar
TLSH C5C4F18C35A0B2AFE9F84DB59C246D2447613367070BFF07899369F497C9BE6AE04097
Reporter abuse_ch
Tags:exe


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: blue117.dnsmisitio.net
Sending IP: 186.64.119.176
From: mangelicanavarros@proiberchile.cl
Subject: Re: 6.2X3.1m outdoor single side billboard-from Rachel Yeroo
Attachment: Order List, specifications.zip (contains "Order List, specifications.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
57
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-08-18 11:48:09 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Program crash
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe ba739024a4d86294decd11b769dc20bee8fbc9728b17ae35282682114d397c49

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments