MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f1da2af4d03374487f047533fcf04795dab48c3b862342c0219bab3e5dbb52c4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Ramnit
Vendor detections: 10
| SHA256 hash: | f1da2af4d03374487f047533fcf04795dab48c3b862342c0219bab3e5dbb52c4 |
|---|---|
| SHA3-384 hash: | 61ead3e18b71efb07bd1045e8981a4be96b19de33c6240530f498b54cd8187dbda57bbd8e6d410fce6f7594d479b37fa |
| SHA1 hash: | 294f35409b2b551d19da913144d60c433e4a329d |
| MD5 hash: | ccccf92266b11c7cedb2c1407882280e |
| humanhash: | colorado-twenty-zebra-hotel |
| File name: | ccccf922_by_Libranalysis |
| Download: | download sample |
| Signature | Ramnit |
| File size: | 160'204 bytes |
| First seen: | 2021-05-05 08:08:31 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 7b7934e66094c0c143762109c757defc (2 x Ramnit) |
| ssdeep | 3072:MnyNyBzvw3LUfoOTvluvVrt9W3jAaAi4dzC:MnZvw3wxQVrt+AJG |
| Threatray | 1'122 similar samples on MalwareBazaar |
| TLSH | 47F304136783C4B3D2A801B58B39CEF496659DDB093E7E0ABE80F9491BE09497637347 |
| Reporter | |
| Tags: | ramnit |
Intelligence
File Origin
# of uploads :
1
# of downloads :
1'170
Origin country :
n/a
Vendor Threat Intelligence
Detection:
Ramnit
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the Windows subdirectories
Creating a process from a recently created file
Launching a process
Creating a window
Searching for the window
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Ramnit
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
88 / 100
Signature
Antivirus / Scanner detection for submitted sample
Delayed program exit found
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Behaviour
Behavior Graph:
Detection:
ramnit
Threat name:
Win32.Worm.Ramnit
Status:
Malicious
First seen:
2020-05-06 19:45:48 UTC
AV detection:
28 of 29 (96.55%)
Threat level:
5/5
Verdict:
malicious
Similar samples:
+ 1'112 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
8/10
Tags:
upx
Behaviour
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Drops file in System32 directory
Loads dropped DLL
Executes dropped EXE
UPX packed file
Unpacked files
SH256 hash:
985f1f17203a632b8fb2093278b42e3de3f9a7df1409431b7010df765675198a
MD5 hash:
0f1114d69d2541d8a3e9f9263a0b7e54
SHA1 hash:
8e310de4cb97eaa9395829b816d8968d3a1df9f8
Detections:
win_ramnit_g0
win_ramnit_g1
win_ramnit_auto
Parent samples :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 hash:
5e805780f4e840580c60a8925a129e78b6b4bcf2a64cc12287c9f2f0ce25c4a4
MD5 hash:
9e57e3a559908c2445d40496210707da
SHA1 hash:
4b6db64c6e560665f13f3974457a880c53a6174e
Detections:
win_ramnit_g0
win_ramnit_g1
win_ramnit_auto
Parent samples :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 hash:
f1da2af4d03374487f047533fcf04795dab48c3b862342c0219bab3e5dbb52c4
MD5 hash:
ccccf92266b11c7cedb2c1407882280e
SHA1 hash:
294f35409b2b551d19da913144d60c433e4a329d
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0009] Anti-Behavioral Analysis::Virtual Machine Detection
1) [C0052] File System Micro-objective::Writes File
2) [C0034.001] Operating System Micro-objective::Set Variable::Environment Variable
3) [C0036.004] Operating System Micro-objective::Create Registry Key::Registry
4) [C0036.002] Operating System Micro-objective::Delete Registry Key::Registry
5) [C0036.007] Operating System Micro-objective::Delete Registry Value::Registry
6) [C0036.003] Operating System Micro-objective::Open Registry Key::Registry
7) [C0036.005] Operating System Micro-objective::Query Registry Key::Registry
8) [C0036.006] Operating System Micro-objective::Query Registry Value::Registry
9) [C0036.001] Operating System Micro-objective::Set Registry Key::Registry
10) [C0040] Process Micro-objective::Allocate Thread Local Storage
11) [C0041] Process Micro-objective::Set Thread Local Storage Value
12) [C0018] Process Micro-objective::Terminate Process