MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 01f936785968394ba82a93a816c897d77879a247b12621b42e12b2a7592a4f6d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 01f936785968394ba82a93a816c897d77879a247b12621b42e12b2a7592a4f6d
SHA3-384 hash: 8d7721f6e5cd5ad11bdfff517ac35dd0c87b764b83c4316d6e1c7716eb00215642535fb19af11dc8fb7b05d7de74c1a1
SHA1 hash: 9e12ee9621624f5905a5837652fbc73ce7746a89
MD5 hash: de26468fc5b2c2f00c408f9e810f6129
humanhash: william-coffee-undress-leopard
File name:Duck Porn.exe
Download: download sample
File size:789'925 bytes
First seen:2020-06-24 11:46:49 UTC
Last seen:2020-06-24 12:53:12 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 12288:ehqxSLo5C1Ps4Xh1pTQQuPupd8p1ogsjeLQjHbZOffj0Uuc33:eHLmCiIh1pk3P2eCjeLQ/YnTn
Threatray 716 similar samples on MalwareBazaar
TLSH 22F4E1256FEDCC70C0A11C711974261959BEAC300FBFD783E7B56C65D678AD23A30AA2
Reporter JAMESWT_WT

Intelligence


File Origin
# of uploads :
2
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Running batch commands
Launching a process
Forced system process termination
Deleting a recently created file
Using the Windows Management Instrumentation requests
Creating a file in the %AppData% directory
Creating a file
Creating a process with a hidden window
Blocking the Windows Defender launch
Unauthorized injection to a recently created process
Enabling autorun with Startup directory
Threat name:
Win32.Trojan.Samas
Status:
Malicious
First seen:
2020-06-24 11:48:06 UTC
File Type:
PE (Exe)
Extracted files:
29
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion trojan persistence
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Creates scheduled task(s)
Delays execution with timeout.exe
Modifies service
Loads dropped DLL
Executes dropped EXE
Modifies Windows Defender Real-time Protection settings
Modifies security service
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments