MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 05ce34031e655fdcea117c738f83a823109f3c9d17db39315fadeceb44ab7068. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 05ce34031e655fdcea117c738f83a823109f3c9d17db39315fadeceb44ab7068
SHA3-384 hash: b438d50810da79e3a53fbdb91c68e1f5b66cb13e1be889994cd2ecb9dadf4c592d73bb9443fff9f83a1b2d4d9648af3c
SHA1 hash: 82589d4f9b5250f1ca9d512ac5943fd8afa94f91
MD5 hash: 2e59bf0510ff753c4448a3a428f19db2
humanhash: alpha-kitten-vegan-alanine
File name:2e59bf0510ff753c4448a3a428f19db2.dll
Download: download sample
File size:232'960 bytes
First seen:2021-03-30 07:13:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a82ee962c2400be0e0e4803eb65a2b0b
ssdeep 6144:ANR3Tp8qZOwFxZhK4STmFx7HUdOIpmUzt2GswYcM:A7318qG4S6FN0dOIoSYX
Threatray 123 similar samples on MalwareBazaar
TLSH FC34E08266A254F9C46F8338DAE30B85E3B4F429837553CF536482661F736D86E3E721
Reporter abuse_ch
Tags:dll

Intelligence


File Origin
# of uploads :
1
# of downloads :
102
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2e59bf0510ff753c4448a3a428f19db2.dll
Verdict:
No threats detected
Analysis date:
2021-03-30 07:50:25 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
88 / 100
Signature
Allocates memory in foreign processes
Creates an autostart registry key pointing to binary in C:\Windows
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 377992 Sample: b49zEBfIlL.dll Startdate: 30/03/2021 Architecture: WINDOWS Score: 88 98 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->98 12 loaddll64.exe 1 2->12         started        14 rundll32.exe 16 2->14         started        17 rundll32.exe 1 16 2->17         started        process3 dnsIp4 20 rundll32.exe 25 12->20         started        22 cmd.exe 1 12->22         started        25 rundll32.exe 16 12->25         started        112 System process connects to network (likely due to code injection or exploit) 14->112 114 Writes to foreign memory regions 14->114 116 Allocates memory in foreign processes 14->116 27 cmd.exe 1 14->27         started        90 18.236.88.209, 443, 49711, 49714 AMAZON-02US United States 17->90 118 Modifies the context of a thread in another process (thread injection) 17->118 120 Sample uses process hollowing technique 17->120 122 Injects a PE file into a foreign processes 17->122 30 cmd.exe 1 17->30         started        signatures5 process6 dnsIp7 32 cmd.exe 1 20->32         started        102 Uses ping.exe to sleep 22->102 104 Uses ping.exe to check the status of other devices and networks 22->104 36 rundll32.exe 16 22->36         started        38 conhost.exe 22->38         started        40 cmd.exe 1 25->40         started        94 54.215.251.33, 443, 49717, 49736 AMAZON-02US United States 27->94 42 conhost.exe 30->42         started        signatures8 process9 dnsIp10 88 8.8.7.7 GOOGLEUS United States 32->88 96 Uses ping.exe to sleep 32->96 44 rundll32.exe 17 32->44         started        47 conhost.exe 32->47         started        49 PING.EXE 1 32->49         started        51 cmd.exe 1 36->51         started        54 PING.EXE 1 40->54         started        57 conhost.exe 40->57         started        59 rundll32.exe 40->59         started        signatures11 process12 dnsIp13 86 C:\Users\user\AppData\Local\Temp\HXI25.dll, PE32+ 44->86 dropped 61 cmd.exe 1 44->61         started        100 Uses ping.exe to sleep 51->100 64 conhost.exe 51->64         started        66 PING.EXE 1 51->66         started        68 rundll32.exe 51->68         started        92 192.168.2.1 unknown unknown 54->92 file14 signatures15 process16 signatures17 108 Uses ping.exe to sleep 61->108 70 rundll32.exe 1 16 61->70         started        73 conhost.exe 61->73         started        75 PING.EXE 1 61->75         started        process18 signatures19 106 Creates an autostart registry key pointing to binary in C:\Windows 70->106 77 cmd.exe 1 70->77         started        process20 signatures21 110 Uses ping.exe to sleep 77->110 80 rundll32.exe 16 77->80         started        82 conhost.exe 77->82         started        84 PING.EXE 1 77->84         started        process22
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Adds Run key to start application
Loads dropped DLL
Blocklisted process makes network request
Unpacked files
SH256 hash:
05ce34031e655fdcea117c738f83a823109f3c9d17db39315fadeceb44ab7068
MD5 hash:
2e59bf0510ff753c4448a3a428f19db2
SHA1 hash:
82589d4f9b5250f1ca9d512ac5943fd8afa94f91
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 05ce34031e655fdcea117c738f83a823109f3c9d17db39315fadeceb44ab7068

(this sample)

  
Delivery method
Distributed via web download

Comments