MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 02b0990c02754ffbf410cd42a50136215946b4e20a943bbd24ddb5c2b4f62be6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: 02b0990c02754ffbf410cd42a50136215946b4e20a943bbd24ddb5c2b4f62be6
SHA3-384 hash: d04162790758dbf68a92429d2e4717b29f8426a911a7ab1275a3241a72aa1538fb080febfc894a8286f96d60c379a9f3
SHA1 hash: f51e3c75f6cadb0d4fda1e497f6f6e01c3d0b2a3
MD5 hash: a9b9c8daf276ec04a6e7e77298b1eb19
humanhash: two-table-fruit-alabama
File name:kins_3.2.0.0.vir
Download: download sample
Signature VMZeuS
File size:207'872 bytes
First seen:2020-07-19 16:48:56 UTC
Last seen:2020-07-19 19:12:16 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash dadcf775f08cca56a599ab4f40faa7c2
ssdeep 1536:LOz++5mHBQ0lvIFjf3yqRAaK2ID15BHVc2+68/zwCvV:5+58BQQvIBf76afID15x8LwyV
TLSH DF14F16F58F41973CCDD1AB442DB4628FE76BB20FA516A48C30A433BC93978FB85A501
Reporter @tildedennis
Tags:kins vmzeus


Twitter
@tildedennis
kins version 3.2.0.0

Intelligence


File Origin
# of uploads :
3
# of downloads :
19
Origin country :
US US
Mail intelligence
No data
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
100 / 100
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Rdn
Status:
Malicious
First seen:
2015-11-05 10:45:35 UTC
AV detection:
26 of 31 (83.87%)
Threat level
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware
Behaviour
Suspicious behavior: EnumeratesProcesses
Modifies system certificate store
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Adds Run key to start application
Deletes itself
Reads user/profile data of web browsers
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Executes dropped EXE
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments