MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222
SHA3-384 hash: a3c6722c8345645a03c4112ba7de76bc8ff027123fe8e037d32fee769c032246c8388449372c368a59b5aaeb858c8b64
SHA1 hash: b80294261c8a1635e16e14f55a3d76889ff2c857
MD5 hash: 9f1e5d66c2889018daef4aef604eebc4
humanhash: low-pasta-mississippi-bulldog
File name:aicustact.dll
Download: download sample
File size:93'496 bytes
First seen:2022-04-18 15:32:23 UTC
Last seen:2022-05-11 18:51:33 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 781ad1ed89a3aecb77ed4db0c52aadd4
ssdeep 1536:dDSujgz88er773ZNpElWnlBArCvi1o4T0EAZGZui:owgz88ereWn/7w05g0i
Threatray 497 similar samples on MalwareBazaar
TLSH T144933A4173E451B9F5E76AB03FFAD615CA36F8A8A472C51F4764080B59E0A42FB26333
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter Anonymous
Tags:dll signed

Code Signing Certificate

Organisation:Caphyon SRL
Issuer:thawte SHA256 Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:2015-02-23T00:00:00Z
Valid to:2017-02-22T23:59:59Z
Serial number: 4570791d257bf46701b5e3fd62a06336
Thumbprint Algorithm:SHA256
Thumbprint: 5e184c26880d832fe42a4751df2a19d60932afe832d44dcbbbc0320a46304edb
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
207
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed remote.exe shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
56 / 100
Signature
Contains functionality to detect sleep reduction / modifications
Sigma detected: Suspicious Call by Ordinal
System process connects to network (likely due to code injection or exploit)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 594495 Sample: Binary.aicustact.dll Startdate: 22/03/2022 Architecture: WINDOWS Score: 56 30 Sigma detected: Suspicious Call by Ordinal 2->30 8 loaddll32.exe 1 2->8         started        process3 process4 10 rundll32.exe 8->10         started        13 rundll32.exe 8->13         started        16 cmd.exe 1 8->16         started        18 6 other processes 8->18 dnsIp5 32 System process connects to network (likely due to code injection or exploit) 10->32 34 Contains functionality to detect sleep reduction / modifications 10->34 20 WerFault.exe 6 9 10->20         started        28 www.google.com 142.250.203.100, 49763, 80 GOOGLEUS United States 13->28 22 rundll32.exe 16->22         started        24 WerFault.exe 9 18->24         started        signatures6 process7 process8 26 WerFault.exe 19 9 22->26         started       
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Program crash
Unpacked files
SH256 hash:
02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222
MD5 hash:
9f1e5d66c2889018daef4aef604eebc4
SHA1 hash:
b80294261c8a1635e16e14f55a3d76889ff2c857
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments