MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ce2700966f2ce633908d111088351c66794a122a892e844816cc02372f028a13. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Ramnit


Vendor detections: 8


Intelligence 8 IOCs YARA 4 File information Comments 1

SHA256 hash: ce2700966f2ce633908d111088351c66794a122a892e844816cc02372f028a13
SHA3-384 hash: f7753ac88f971f908a9385e7ea55bacda387d03172fd76a5fd9b4f578a8bb36830a4b0bd8dc883f73928386dccbc232e
SHA1 hash: 14f54f874f39ee0405a0de2246702b57a7e8bd7c
MD5 hash: 291647618fe1c16ae7494538dca3c2c7
humanhash: utah-tennessee-hydrogen-hawaii
File name:29164761_by_Libranalysis
Download: download sample
Signature Ramnit
File size:434'565 bytes
First seen:2021-05-05 10:08:08 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash fb67735907b73235478df63d504e19f4 (1 x Ramnit)
ssdeep 3072:rqjFK3xg8HE5gVcn6a1uuBRw6k00rg5NstdU/y8B5qPZKLDvWlSgrB5Fm+XlD3U6:rEUVHbKwpUv/CZ0WlSgrBi4lDIVhK
Threatray 1'129 similar samples on MalwareBazaar
TLSH C0947813E3D182AED3D60A30DDE40EE9A9675F8CCDD4C106BB0CA2985B2DD57861639F
Reporter Libranalysis
Tags:ramnit


Avatar
Libranalysis
Uploaded as part of the sample sharing project

Intelligence


File Origin
# of uploads :
1
# of downloads :
1'181
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a file in the Windows subdirectories
Creating a process from a recently created file
Creating a file in the %temp% directory
Deleting a recently created file
Launching the default Windows debugger (dwwin.exe)
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
Antivirus / Scanner detection for submitted sample
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Renames NTDLL to bypass HIPS
Yara detected Ramnit
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 404814 Sample: 29164761_by_Libranalysis Startdate: 05/05/2021 Architecture: WINDOWS Score: 96 63 Malicious sample detected (through community Yara rule) 2->63 65 Antivirus / Scanner detection for submitted sample 2->65 67 Multi AV Scanner detection for submitted file 2->67 69 3 other signatures 2->69 8 loaddll32.exe 13 2 2->8         started        process3 file4 49 C:\Windows\SysWOW64\loaddll32mgr.exe, PE32 8->49 dropped 79 Drops executables to the windows directory (C:\Windows) and starts them 8->79 12 regsvr32.exe 25 1 8->12         started        16 rundll32.exe 8->16         started        18 cmd.exe 1 8->18         started        20 5 other processes 8->20 signatures5 process6 file7 51 C:\Windows\SysWOW64\regsvr32mgr.exe, PE32 12->51 dropped 81 Drops executables to the windows directory (C:\Windows) and starts them 12->81 22 regsvr32mgr.exe 1 12->22         started        53 C:\Windows\SysWOW64\rundll32mgr.exe, PE32 16->53 dropped 26 rundll32mgr.exe 16->26         started        28 rundll32.exe 1 18->28         started        55 C:\Users\user\AppData\Local\...\~TM8256.tmp, PE32 20->55 dropped 83 Multi AV Scanner detection for dropped file 20->83 85 Renames NTDLL to bypass HIPS 20->85 30 iexplore.exe 157 20->30         started        33 WerFault.exe 23 9 20->33         started        35 WerFault.exe 20->35         started        signatures8 process9 dnsIp10 43 C:\Users\user\AppData\Local\...\~TM43B7.tmp, PE32 22->43 dropped 71 Multi AV Scanner detection for dropped file 22->71 73 Renames NTDLL to bypass HIPS 22->73 45 C:\Users\user\AppData\Local\...\~TM6F99.tmp, PE32 26->45 dropped 37 WerFault.exe 26->37         started        39 rundll32mgr.exe 1 28->39         started        57 tls13.taboola.map.fastly.net 151.101.1.44, 443, 49771, 49772 FASTLYUS United States 30->57 59 geolocation.onetrust.com 104.20.185.68, 443, 49756, 49757 CLOUDFLARENETUS United States 30->59 61 8 other IPs or domains 30->61 file11 signatures12 process13 file14 47 C:\Users\user\AppData\Local\...\~TM44E0.tmp, PE32 39->47 dropped 75 Multi AV Scanner detection for dropped file 39->75 77 Renames NTDLL to bypass HIPS 39->77 signatures15
Threat name:
Win32.Worm.Ramnit
Status:
Malicious
First seen:
2020-05-05 18:42:13 UTC
AV detection:
29 of 30 (96.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Drops file in System32 directory
Loads dropped DLL
Executes dropped EXE
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
ce2700966f2ce633908d111088351c66794a122a892e844816cc02372f028a13
MD5 hash:
291647618fe1c16ae7494538dca3c2c7
SHA1 hash:
14f54f874f39ee0405a0de2246702b57a7e8bd7c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:win_ramnit_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_ramnit_g0
Author:Slavo Greminger, SWITCH-CERT
Rule name:win_ramnit_g1
Author:Daniel Plohmann <daniel.plohmann<at>fkie.fraunhofer.de>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-05 11:15:14 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [F0002.002] Collection::Polling
2) [C0051] File System Micro-objective::Read File
3) [C0036.004] Operating System Micro-objective::Create Registry Key::Registry
4) [C0036.002] Operating System Micro-objective::Delete Registry Key::Registry
5) [C0036.007] Operating System Micro-objective::Delete Registry Value::Registry
6) [C0036.003] Operating System Micro-objective::Open Registry Key::Registry
7) [C0036.005] Operating System Micro-objective::Query Registry Key::Registry
8) [C0036.006] Operating System Micro-objective::Query Registry Value::Registry
9) [C0036.001] Operating System Micro-objective::Set Registry Key::Registry