MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fe28cd2877b284b649c8fe2ed8683c6a262bed56e83812c4f453bfb6503a5892. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mofksys


Vendor detections: 16


Intelligence 16 IOCs YARA 17 File information Comments

SHA256 hash: fe28cd2877b284b649c8fe2ed8683c6a262bed56e83812c4f453bfb6503a5892
SHA3-384 hash: f701cb7dac260c116c9b86fdc79f848a69cfd03924e651c2bebc9bf5cec086aec90300b6145279b24be07fcdbf135e4e
SHA1 hash: 1291e5190ec2822090c764cfcceb63142e4ee85b
MD5 hash: 8a60e9f5de7c6a200a57e4cccc25f72d
humanhash: shade-quiet-pizza-autumn
File name:notepad.exe
Download: download sample
Signature Mofksys
File size:234'099 bytes
First seen:2025-04-28 17:24:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 8c16c795b57934183422be5f6df7d891 (36 x Mofksys, 18 x CryptOne, 6 x AveMariaRAT)
ssdeep 3072:XVqoCl/YgjxEufVU0TbTyDDalX5Xy1pHca6vCRfshufuEeNOiVG5:XsLqdufVUNDarg/6aReG5
TLSH T1DB342B13E91250BFC562C5F119ABF736B532BD2916B45F0B2720EB042A71623B2F961F
TrID 42.6% (.EXE) Win32 Executable (generic) (4504/4/1)
19.4% (.ICL) Windows Icons Library (generic) (2059/9)
18.9% (.EXE) Generic Win/DOS Executable (2002/3)
18.9% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
dhash icon 00928e8e8686b800 (21 x Mofksys, 9 x CryptOne, 5 x Amadey)
Reporter LuRisa798
Tags:exe Jeefo Mofksys Virus

Intelligence


File Origin
# of uploads :
1
# of downloads :
470
Origin country :
CA CA
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
notepad.exe
Verdict:
Malicious activity
Analysis date:
2025-04-28 15:02:38 UTC
Tags:
jeefo

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
trojware swisyn virus spawn
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Creating a file in the Windows subdirectories
Creating a file
Creating a process from a recently created file
Connection attempt
Creating a process with a hidden window
Enabling the 'hidden' option for recently created files
Setting a single autorun event
Enabling a "Do not show hidden files" option
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm mofksys overlay overlay packed packed swisyn virus visual_basic
Result
Threat name:
CryptOne, Havoc, Mofksys
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Detected CryptOne packer
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Found direct / indirect Syscall (likely to bypass EDR)
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Process Parents
Sigma detected: System File Execution Location Anomaly
System process connects to network (likely due to code injection or exploit)
Writes to foreign memory regions
Yara detected Havoc
Yara detected Mofksys
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1676527 Sample: notepad.exe Startdate: 28/04/2025 Architecture: WINDOWS Score: 100 63 googlecode.l.googleusercontent.com 2->63 65 codecmd03.googlecode.com 2->65 67 2 other IPs or domains 2->67 83 Antivirus detection for dropped file 2->83 85 Antivirus / Scanner detection for submitted sample 2->85 87 Multi AV Scanner detection for dropped file 2->87 89 9 other signatures 2->89 11 notepad.exe 1 3 2->11         started        15 svchost.exe 2->15 injected 17 svchost.exe 2->17         started        19 6 other processes 2->19 signatures3 process4 dnsIp5 57 C:\Windows\Resources\Themes\icsys.icn.exe, MS-DOS 11->57 dropped 59 C:\Users\user\Desktop\notepad.exe, PE32+ 11->59 dropped 105 Drops executables to the windows directory (C:\Windows) and starts them 11->105 22 icsys.icn.exe 3 11->22         started        26 notepad.exe 11->26         started        107 Injects code into the Windows Explorer (explorer.exe) 15->107 29 consent.exe 15->29         started        31 explorer.exe 1 15->31         started        33 svchost.exe 15->33         started        109 Changes security center settings (notifications, updates, antivirus, firewall) 17->109 35 MpCmdRun.exe 17->35         started        69 127.0.0.1 unknown unknown 19->69 file6 signatures7 process8 dnsIp9 53 C:\Windows\Resources\Themes\explorer.exe, MS-DOS 22->53 dropped 91 Antivirus detection for dropped file 22->91 93 Drops PE files with benign system names 22->93 37 explorer.exe 15 22->37         started        75 10.0.2.37, 80 unknown unknown 26->75 95 Found direct / indirect Syscall (likely to bypass EDR) 26->95 97 Writes to foreign memory regions 29->97 42 conhost.exe 35->42         started        file10 signatures11 process12 dnsIp13 71 142.250.141.82, 49723, 49726, 49730 GOOGLEUS United States 37->71 73 googlecode.l.googleusercontent.com 142.251.2.82, 49722, 49724, 49725 GOOGLEUS United States 37->73 55 C:\Windows\Resources\spoolsv.exe, MS-DOS 37->55 dropped 99 Antivirus detection for dropped file 37->99 101 System process connects to network (likely due to code injection or exploit) 37->101 103 Drops PE files with benign system names 37->103 44 spoolsv.exe 3 37->44         started        file14 signatures15 process16 file17 61 C:\Windows\Resources\svchost.exe, MS-DOS 44->61 dropped 111 Antivirus detection for dropped file 44->111 113 Drops PE files with benign system names 44->113 48 svchost.exe 2 2 44->48         started        signatures18 process19 signatures20 77 Antivirus detection for dropped file 48->77 79 Detected CryptOne packer 48->79 81 Drops executables to the windows directory (C:\Windows) and starts them 48->81 51 spoolsv.exe 1 48->51         started        process21
Threat name:
Win32.Worm.Mofksys
Status:
Malicious
First seen:
2025-04-20 23:21:42 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
24 of 24 (100.00%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Similar samples:
Result
Malware family:
n/a
Score:
  10/10
Tags:
defense_evasion discovery persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Drops file in Windows directory
Drops file in System32 directory
Adds Run key to start application
Executes dropped EXE
Modifies visiblity of hidden/system files in Explorer
Verdict:
Malicious
Tags:
red_team_tool havoc trojan Win.Trojan.Marte-10007780-0 c2
YARA:
win_havoc_djb2_hashing_routine_oct_2022 win_havoc_ntdll_hashes_oct_2022 Windows_Trojan_Havoc_88053562 Windows_Generic_Threat_7526f106 Windows_Generic_Threat_cbe3313a
Unpacked files
SH256 hash:
fe28cd2877b284b649c8fe2ed8683c6a262bed56e83812c4f453bfb6503a5892
MD5 hash:
8a60e9f5de7c6a200a57e4cccc25f72d
SHA1 hash:
1291e5190ec2822090c764cfcceb63142e4ee85b
Detections:
win_havoc_w0 win_havoc_w1
SH256 hash:
99784f28e4e95f044d97e402bbf58f369c7c37f49dc5bf48e6b2e706181db3b7
MD5 hash:
a13daa35fd7b873f87379a94b97168e2
SHA1 hash:
cdbab09ab27234cbd0739c438f4a96f6f7b53f50
Detections:
win_havoc_w0 win_havoc_w1 win_havoc_djb2_hashing_routine_oct_2022 win_havoc_ntdll_hashes_oct_2022
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DemonNtdllHashes
Author:embee_research @ HuntressLabs
Rule name:HavocDemonDJB2
Author:embee_research @ HuntressLabs
Rule name:mal_loader_havoc_x64
Author:Maxime THIEBAUT (@0xThiebaut)
Description:Detects Havoc C2's import hashing algorithm
Reference:https://github.com/HavocFramework/Havoc/blob/1248ff9ecc964325447128ae3ea819f1ad10b790/Teamserver/data/implants/Shellcode/Source/Utils.c
Rule name:SEH__vba
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SUSP_Imphash_Mar23_2
Author:Arnim Rupp (https://github.com/ruppde)
Description:Detects imphash often found in malware samples (Zero hits with with search for 'imphash:x p:0' on Virustotal)
Reference:Internal Research
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:Windows_Generic_Threat_3f390999
Author:Elastic Security
Rule name:Windows_Generic_Threat_7526f106
Author:Elastic Security
Rule name:Windows_Generic_Threat_cbe3313a
Author:Elastic Security
Rule name:Windows_Trojan_Generic_9997489c
Author:Elastic Security
Rule name:Windows_Trojan_Havoc_88053562
Author:Elastic Security
Rule name:Windows_Trojan_Havoc_ffecc8af
Author:Elastic Security
Rule name:win_havoc_demon_ntdll_hashes
Author:embee_research @ HuntressLabs
Description:Detection of havoc demons via hardcoded ntdll api hashes
Rule name:win_havoc_djb2_hashing_routine_oct_2022
Author:embee_research @ HuntressLabs
Rule name:win_havoc_ntdll_hashes_oct_2022
Author:embee_research @ HuntressLabs
Description:Detection of havoc demons via hardcoded ntdll api hashes
Rule name:win_havoc_w0
Author:embee_research @ HuntressLabs
Rule name:win_havoc_w1
Author:embee_research @ HuntressLabs

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
CHECK_TRUST_INFORequires Elevated Execution (level:requireAdministrator)high
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::__vbaCopyBytes
MSVBVM60.DLL::__vbaSetSystemError
MSVBVM60.DLL::__vbaExitProc
MSVBVM60.DLL::__vbaObjSetAddref
MSVBVM60.DLL::EVENT_SINK_AddRef
MSVBVM60.DLL::__vbaFileOpen

Comments