MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d907d7da5552b08415af0136f83af0d42d9cfa4c4ebe827a3bcfe3ec4f09e76c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: d907d7da5552b08415af0136f83af0d42d9cfa4c4ebe827a3bcfe3ec4f09e76c
SHA3-384 hash: 2969328488a8602a5f8884efa8983d9c20f68975b47d08493a813f8e6e747d5d974a827837b1de4ecf46219fdf29a661
SHA1 hash: 8c525314a2347db926d9ff956d37fb6959d90520
MD5 hash: 80a7df3aa139f95f4d1300cbaa70527c
humanhash: timing-johnny-avocado-early
File name:Shipping Details _PDF.exe
Download: download sample
Signature n/a
File size:644'608 bytes
First seen:2020-07-31 12:16:25 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep 12288:Xs/+K6XSm6QcOpTNFHAiFmeBxeAAPROgprrWWHrCG3SR5uLPnNZEYUVl8:XI11wTfHAlebeAAPHrWWeG385uLP/xU
TLSH F9D4CF364210AF6AE13F537CC220214497F1AC37E723E789BDEB30E94A76F549765622
Reporter @abuse_ch
Tags:exe TNT


Twitter
@abuse_ch
Malspam distributing unidentified malware:

HELO: d0.006.viliianesefmsrl.cf
Sending IP: 139.59.208.231
From: "TNT EXPRESS CONSIGNMENT"<service@tnt.com>
Subject: TNT Express Delivery Consignment Notification
Attachment: Shipping Details _PDF.rar (contains "Shipping Details _PDF.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
FR FR
Mail intelligence
Geo location:
DE Germany
Volume:
Low
Geo location:
Global
Volume:
Low
Vendor Threat Intelligence
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-07-31 12:18:08 UTC
AV detection:
9 of 31 (29.03%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Program crash
Program crash
Threat name:
Suspicious File
Score:
0.45

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe d907d7da5552b08415af0136f83af0d42d9cfa4c4ebe827a3bcfe3ec4f09e76c

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments