MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 cbb6d89187847aab1fcff6b5d832ea80bca30bfe5520702133cab83335392ead. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 4
| SHA256 hash: | cbb6d89187847aab1fcff6b5d832ea80bca30bfe5520702133cab83335392ead |
|---|---|
| SHA3-384 hash: | b22267ed4b5c239b5a31785ee0fa14eb1b646bf80a41472cfaa5fa03fbe6bd76566b58e59458e0abd7328e90bc22e7f5 |
| SHA1 hash: | 42d24e14f852afba26c793bf4063ad80f581452a |
| MD5 hash: | e64f048c8c196195443a74e911748666 |
| humanhash: | undress-beer-solar-yellow |
| File name: | products samples.exe |
| Download: | download sample |
| File size: | 505'856 bytes |
| First seen: | 2020-06-20 06:11:46 UTC |
| Last seen: | 2020-06-22 08:03:04 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | ed4c94ce952225916eebcf8e6384bf1e (2 x NetWire, 1 x RemcosRAT) |
| ssdeep | 6144:m/iRspKoKLn1QoIPDhdcpHnibm7GrHdKALOj14riZ7v1vEmQq9t/uubbsl6VaVLk:CiRspDYbIPFZDd5r87ZgWjbbi6V |
| Threatray | 5'152 similar samples on MalwareBazaar |
| TLSH | B7B48E63F2A18437D1232A7D4D0FA67CA8367E513E38684A2BD56D4C5F79381342F29B |
| Reporter |
Intelligence
File Origin
# of uploads :
3
# of downloads :
87
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Gathering data
Threat name:
Win32.Trojan.Delf
Status:
Malicious
First seen:
2020-06-20 03:17:44 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 5'142 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
8/10
Tags:
persistence spyware evasion trojan
Behaviour
Suspicious use of WriteProcessMemory
Suspicious behavior: MapViewOfSection
Suspicious use of SendNotifyMessage
Suspicious use of FindShellTrayWindow
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Adds Run entry to start application
Legitimate hosting services abused for malware hosting/C2
Reads user/profile data of web browsers
Adds Run entry to policy start application
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
exe cbb6d89187847aab1fcff6b5d832ea80bca30bfe5520702133cab83335392ead
(this sample)
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.