MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 059cd9bb3ad74aa7d4a7720c03e07114e89f770dd76523f56febd95f408b8cd3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 059cd9bb3ad74aa7d4a7720c03e07114e89f770dd76523f56febd95f408b8cd3
SHA3-384 hash: 65de2e15f65cf79884441572abb269ab8437d474de488c54def5a856ebe4efbb17758338d7edebdcc1ffabeec6a7ab4b
SHA1 hash: 9befbb82364dbc2f09afc9dedd4caeedc9434515
MD5 hash: f51bfbbc86931dbc96c6b4be4b4c3659
humanhash: xray-minnesota-jersey-music
File name:keygen-step-3.exe
Download: download sample
File size:890'368 bytes
First seen:2021-08-13 10:53:15 UTC
Last seen:2021-08-13 11:53:33 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f6ef2fc23ca2d85215ddcf8b4448b79f (1 x CoinMiner)
ssdeep 24576:mV3TJTgieFtoQjNfh9FaXASi9i3kRha7cYWc:mV31Eby6fjs3kRha5W
Threatray 22 similar samples on MalwareBazaar
TLSH T12415F173042EBBE8E795E4FCD96F3580D4825C89727A64462F05DF81B8CEDCA072A593
Reporter Anonymous
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
110
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
RIG Exploit Kit.html
Verdict:
Malicious activity
Analysis date:
2021-08-13 10:38:04 UTC
Tags:
evasion trojan rat azorult stealer raccoon loader fareit pony

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Reading critical registry keys
DNS request
Sending a UDP request
Sending a custom TCP request
Connection attempt
Sending an HTTP POST request
Creating a file in the Windows directory
Creating a service
Creating a process from a recently created file
Sending an HTTP GET request
Launching the default Windows debugger (dwwin.exe)
Enabling autorun for a service
Deleting of the original file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Spyware.Fbkatz
Status:
Malicious
First seen:
2021-08-11 06:37:34 UTC
AV detection:
16 of 28 (57.14%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Drops file in Windows directory
Deletes itself
Executes dropped EXE
Unpacked files
SH256 hash:
4b123a21c6b450ebfa07f955dae08e5bed4e9d2bc3d335e42ff552d67c04a753
MD5 hash:
5c9ef7c76bdc5b8cad3a06d7b6ccdefe
SHA1 hash:
f66cb8facbdf7fbe3345c39ac6e9cfc83ab83f25
SH256 hash:
059cd9bb3ad74aa7d4a7720c03e07114e89f770dd76523f56febd95f408b8cd3
MD5 hash:
f51bfbbc86931dbc96c6b4be4b4c3659
SHA1 hash:
9befbb82364dbc2f09afc9dedd4caeedc9434515
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments