MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 04ced453d7e0681c6da073ddc5172c8976885af3afd3be8abb46008ea0a08dbf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
EternalRocks
Vendor detections: 11
| SHA256 hash: | 04ced453d7e0681c6da073ddc5172c8976885af3afd3be8abb46008ea0a08dbf |
|---|---|
| SHA3-384 hash: | 8ba89a8c894d083602c59b9e6e88470eddfed2952f17cfe9f183b7a88bbf77df3443c05aead12cf27344140a2ab620ff |
| SHA1 hash: | d4c7c583c9423ee4ec932897ee935d194b5b8238 |
| MD5 hash: | 49605489b4e40353b12192422e06a098 |
| humanhash: | autumn-berlin-carbon-failed |
| File name: | CrashRpt1403.dll |
| Download: | download sample |
| Signature | EternalRocks |
| File size: | 10'100'736 bytes |
| First seen: | 2025-12-16 15:38:29 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | dae02f32a21e03ce65412f6e56942daa (123 x YellowCockatoo, 60 x CobaltStrike, 44 x JanelaRAT) |
| ssdeep | 196608:mvBzJxW0KhTwcOvgWu3VWVUPMwCFZuU26yLmp:GW0KhEc+6FWV7dFZ1dCK |
| TLSH | T168A65A10A4C86607FD7ADFBC999E76540F7AB1952501BB28CF5249DA3ED1B68C8038F3 |
| TrID | 78.9% (.DLL) Generic .NET DLL/Assembly (236632/4/32) 10.4% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 3.5% (.EXE) Win64 Executable (generic) (10522/11/4) 2.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 1.5% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Magika | pebin |
| Reporter | |
| Tags: | 144-124-241-181 ACRStealer dll dllHijack EternalRocks |
iamaachum
https://fighthem.space/ => https://mega.nz/file/ykRVyZpJ#DUvY-mNSgdDQM0qdB4vPSdaZHlB6mFH7aJwA_zIxezYACRStealer C2: 144.124.241.181
Intelligence
File Origin
ESVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
5f43b0ad8cdf49434c552629330efc2e02e9f10444200cec44cc81b061e25398
659c31a6b26b23e18ea9d81e986f91ab3dd489e149d7dc8bc11b6364d1412a23
dd86a3e996b53b952e35477b7980929b1c43c42efec0eadc618115a22ffb86dc
edb7270ef47a630256e963b7b490fc2802ebb6fe99ac5a017d35300e107c331e
ac4529e1023ef359eaa2e23c5a4927eb822afe4b4e72860e53748a8e03d009fc
8ea57e02b096d8f2b8c23234ba29dba7fcd61ea4388b89234084252d59d14c26
04ced453d7e0681c6da073ddc5172c8976885af3afd3be8abb46008ea0a08dbf
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETDLLMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.