MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 065208b037a2691eb75a14f97bdbd9914122655d42f6249d2cca419a1e4ba6f1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Hive


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 065208b037a2691eb75a14f97bdbd9914122655d42f6249d2cca419a1e4ba6f1
SHA3-384 hash: 97ed307e5bf6333242acc36987bded4f5f915792d3f43f3163fc977bb4d1030ad7ceea3f42394dd30860fc282e2c5141
SHA1 hash: 8516db624f17ad1cc56f71a69555272b216a8aee
MD5 hash: 44aba241dd3f0d156c6ed82a0ab3a9e1
humanhash: autumn-uranus-green-enemy
File name:065208b037a2691eb75a14f97bdbd9914122655d42f6249d2cca419a1e4ba6f1.bin
Download: download sample
Signature Hive
File size:413'184 bytes
First seen:2022-03-28 23:16:24 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 40064c6eeb9f32dfc55bf2c7514305c2 (3 x Hive)
ssdeep 6144:7++39gJVd8v1934Wx/DSnsJOWGM/gRASu8ixez+AW1LmOBGYYr2:7++ta4tb/2sfSunPNmOW2
Threatray 10 similar samples on MalwareBazaar
TLSH T16F943947F2A2A0BCC16AC0788757A573F932BC0946247E7B27D4BE312F65B50A72E705
Reporter Arkbird_SOLG
Tags:exe Hive Ransomware

Intelligence


File Origin
# of uploads :
1
# of downloads :
443
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionGetTickCount
EvasionQueryPerformanceCounter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug expand.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 598764 Sample: cRqKuC7F3r.bin Startdate: 29/03/2022 Architecture: WINDOWS Score: 48 10 Multi AV Scanner detection for submitted file 2->10 6 cRqKuC7F3r.exe 1 2->6         started        process3 process4 8 conhost.exe 6->8         started       
Threat name:
Win64.Ransomware.Hive
Status:
Malicious
First seen:
2022-03-17 09:09:10 UTC
File Type:
PE+ (Exe)
AV detection:
15 of 26 (57.69%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Unpacked files
SH256 hash:
065208b037a2691eb75a14f97bdbd9914122655d42f6249d2cca419a1e4ba6f1
MD5 hash:
44aba241dd3f0d156c6ed82a0ab3a9e1
SHA1 hash:
8516db624f17ad1cc56f71a69555272b216a8aee
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments