MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 044d234d96ba4d2c8d6b75dce9f3b778137708ed2fd39edfab8711d3431f8763. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 2


Intelligence 2 IOCs YARA File information Comments

SHA256 hash: 044d234d96ba4d2c8d6b75dce9f3b778137708ed2fd39edfab8711d3431f8763
SHA3-384 hash: 6e7cd8f2803a19a124f40c8af634652c3b79cf3d3ae5bfb55dd07abda3675ad73425d04f228f54877a23c6ef573735a8
SHA1 hash: 140edb4850081d890fa7267efe002129ff2c5067
MD5 hash: d071887d9e9af01d3ee009dffe1be16d
humanhash: jig-nevada-eighteen-green
File name:c64.exe
Download: download sample
File size:2'617'697 bytes
First seen:2020-04-20 10:06:48 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash de1fa96ad5bc81910ffb7ed552e29d0d (1 x RedLineStealer, 1 x Gh0stRAT, 1 x Blackmoon)
ssdeep 49152:RxH3KTyEJdyyUa6PrvMrKQHBhzFrBRucp2uBUYYs2aoywX7AqomhDH0vOL:RZ3KOMFkxQHBBZOtuBUg2aKXTJZL
Threatray 22 similar samples on MalwareBazaar
TLSH BEC53396FFC895B0F1615D792C83B0C96B3AFD2B7E64950B2AE43F4E2C79A81144C4E1
Reporter JoulK
Tags:exe miner

Intelligence


File Origin
# of uploads :
1
# of downloads :
293
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Reconyc
Status:
Malicious
First seen:
2019-05-03 23:51:55 UTC
File Type:
PE (Exe)
Extracted files:
21
AV detection:
37 of 45 (82.22%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 044d234d96ba4d2c8d6b75dce9f3b778137708ed2fd39edfab8711d3431f8763

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
CHECK_TRUST_INFORequires Elevated Execution (level:highestAvailable)high
Reviews
IDCapabilitiesEvidence
SHELL_APIManipulates System Shellshell32.dll::ShellExecuteExA
shell32.dll::ShellExecuteA
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIkernel32.dll::LoadLibraryExA
kernel32.dll::GetStartupInfoA
kernel32.dll::GetDiskFreeSpaceA
kernel32.dll::GetCommandLineA
WIN_BASE_IO_APICan Create Fileskernel32.dll::CreateDirectoryA
kernel32.dll::CreateFileA
kernel32.dll::DeleteFileA
kernel32.dll::MoveFileExA
kernel32.dll::GetFileAttributesA
kernel32.dll::FindFirstFileA
WIN_REG_APICan Manipulate Windows Registryadvapi32.dll::RegOpenKeyExA
advapi32.dll::RegQueryValueExA
WIN_USER_APIPerforms GUI Actionsuser32.dll::PeekMessageA
user32.dll::CreateWindowExA

Comments