MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 07c7cb49350bf3c6de4193fb2eeb8dd92d6662d60393ebd483a54bac80fb0b44. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Squirrelwaffle


Vendor detections: 5


Intelligence 5 IOCs YARA 2 File information Comments

SHA256 hash: 07c7cb49350bf3c6de4193fb2eeb8dd92d6662d60393ebd483a54bac80fb0b44
SHA3-384 hash: 6356b43a3b58206421f161ce304e0517cdd554d1e156afa2b053bb48b13a4b54cf5f32a87ad9c8c03ade54674b7d65a5
SHA1 hash: 4087259179a6761e376dcfbf2e981e1c0cacc287
MD5 hash: 3d77d7a2e2697d35b281123afe4b030c
humanhash: floor-iowa-friend-william
File name:test1.test
Download: download sample
Signature Squirrelwaffle
File size:316'832 bytes
First seen:2021-09-25 00:03:58 UTC
Last seen:2021-09-25 01:10:59 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash cc1e6975fa29dad96fae67f7e9b5f02b (1 x Squirrelwaffle)
ssdeep 3072:TsN//P/zD85fNsfmMBkw28lmNQOfNcopS94e+gpiHLXQAAAvvzBSV278HjCFo3s5:MzDkmra8oNBTppeCVSV278DufMs9zD
Threatray 2'069 similar samples on MalwareBazaar
TLSH T14064BE20B5C3E034C43E46B44975D992663C7C704F20DA9B3BA8AF7E5AB71C06936B97
Reporter malware_traffic
Tags:dll SQUIRRELWAFFLE

Intelligence


File Origin
# of uploads :
2
# of downloads :
139
Origin country :
n/a
Vendor Threat Intelligence
Result
Threat name:
Squirrelwaffle
Detection:
malicious
Classification:
troj.evad
Score:
76 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Yara detected Squirrelwaffle
Behaviour
Behavior Graph:
Result
Malware family:
squirrelwaffle
Score:
  10/10
Tags:
family:squirrelwaffle downloader
Behaviour
Suspicious use of WriteProcessMemory
Blocklisted process makes network request
squirrelwaffle
SquirrelWaffle is a simple downloader written in C++.
Malware Config
C2 Extraction:
hutraders.com/0eeUtmJf8O
goodartishard.com/0JXDM9kMwx
now.byteinsure.com/tnjUrmlhN
asceaub.com/Xl8UCLSU
colchonesmanzur.com/GjVgBnKaNIC
sistemasati.com/0SzGNkx6P
maldivehost.net/zLIisQRWZI9
lrdgon.org/l7r96tjAJ
binnawaz.com.pk/jhSZGWS76C
fhstorse.com/vJlgdjJnpIop
Unpacked files
SH256 hash:
b5db4e6800b976c5d78f4a5f842569fc24f430ac3c5d68a3834ee0d24716307d
MD5 hash:
e8f9e6fdd6d4994afd63ab7218e99fa2
SHA1 hash:
4604cea16717f453934e1f3be39661dd8f1a9204
SH256 hash:
07c7cb49350bf3c6de4193fb2eeb8dd92d6662d60393ebd483a54bac80fb0b44
MD5 hash:
3d77d7a2e2697d35b281123afe4b030c
SHA1 hash:
4087259179a6761e376dcfbf2e981e1c0cacc287
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Windows_Loader_SquirrelWaffle
Description:Identifies strings/byte sequence used in unpacked SquirrelWaffle loader
Rule name:win_squirrelwaffle_loader
Author:Rony(@r0ny_123)
Description:Detects unpacked squirrelwaffle loader

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments