MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 081d46c9eae290ad95937c1e87ac2fbae0b345ca7d00a4fe7d5ed8384d200ac7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 081d46c9eae290ad95937c1e87ac2fbae0b345ca7d00a4fe7d5ed8384d200ac7
SHA3-384 hash: 17db04055d36f5dfd74d34da7b7e760b7d27b8c4e2062a83d3eab692fd76d11d245ce0411c1c80e8c45d1aafb94a2c09
SHA1 hash: 0ff2e0829833aa322ac75d1c7d18bc06304fecc7
MD5 hash: 16a784f0bc650f261cc77be66df1bcbf
humanhash: pip-ten-xray-india
File name:16a784f0bc650f261cc77be66df1bcbf.exe
Download: download sample
File size:351'232 bytes
First seen:2021-05-27 12:49:26 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 556bc424bd608c9e064a122699e67eca (7 x RaccoonStealer, 6 x Stop, 1 x CryptBot)
ssdeep 6144:O6+TdqXlE7/wVIEwg+6TWwxnSks5SzL482DTR9Znk9OGer:O6+Tdqa7oBwg+6HIkGSPO1nYB
Threatray 177 similar samples on MalwareBazaar
TLSH DA749E3167E0C039F1F362B449B59379A53A7EE26B3491CF52D13AEA5A316E1AC30743
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
92
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
16a784f0bc650f261cc77be66df1bcbf.exe
Verdict:
Malicious activity
Analysis date:
2021-05-27 16:37:04 UTC
Tags:
trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
DNS request
Sending an HTTP GET request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
84 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Glupteba
Status:
Malicious
First seen:
2021-05-27 07:54:02 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 081d46c9eae290ad95937c1e87ac2fbae0b345ca7d00a4fe7d5ed8384d200ac7

(this sample)

  
Delivery method
Distributed via web download

Comments