MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 095a3f84debd7481b880016a770c211a793847f61c72499b4702b16fd9666b28. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cutwail


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments 1

SHA256 hash: 095a3f84debd7481b880016a770c211a793847f61c72499b4702b16fd9666b28
SHA3-384 hash: dcf92311c2ba8b1e0b6d6c9e3f820472b6a3169e97bda7d58d481deb61b15577dc5a9de5d8cef354f1000b82c8fad834
SHA1 hash: 1b77f4b3443037620ed75804e422fa347d146077
MD5 hash: 2a3acbec7baefea2c2b0eb20ff253eed
humanhash: low-beer-four-island
File name:2a3acbec7baefea2c2b0eb20ff253eed
Download: download sample
Signature Cutwail
File size:189'952 bytes
First seen:2022-06-03 06:52:25 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash cb379c000a7cf90a80518fa5bc4f4cb5 (2 x Smoke Loader, 1 x Cutwail, 1 x Loki)
ssdeep 1536:lzmWRottrUPg+oX/FhukfrMzy/ihDYGe3D/mVvwspq3D4ojorTpPpIzuknMbusKV:laQorQY/fukI2WDYGosv/83wPG6bu3F
Threatray 6 similar samples on MalwareBazaar
TLSH T16604BE2473A0C0B6F0B32A305476CE629AFBB83215B8D04B3BD4177A6F616D09B75767
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 5c59da3ce0c1c850 (36 x Stop, 33 x Smoke Loader, 26 x RedLineStealer)
Reporter zbetcheckin
Tags:32 Cutwail exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
984
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2a3acbec7baefea2c2b0eb20ff253eed
Verdict:
Malicious activity
Analysis date:
2022-06-03 06:54:19 UTC
Tags:
trojan sinkhole

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Сreating synchronization primitives
Creating a file
Enabling the 'hidden' option for recently created files
DNS request
Sending an HTTP POST request
Launching a process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Sending an HTTP POST request to an infection source
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Creates a thread in another existing process (thread injection)
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Send many emails (e-Mail Spam)
System process connects to network (likely due to code injection or exploit)
Tries to resolve many domain names, but no domain seems valid
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 638612 Sample: Rxpb2zKOR3 Startdate: 03/06/2022 Architecture: WINDOWS Score: 100 61 hubbikes.com 2->61 63 vdoherty.com 2->63 65 494 other IPs or domains 2->65 105 Antivirus detection for URL or domain 2->105 107 Multi AV Scanner detection for submitted file 2->107 109 Machine Learning detection for sample 2->109 111 Send many emails (e-Mail Spam) 2->111 8 Rxpb2zKOR3.exe 3 66 2->8         started        13 tibqanobatib.exe 48 2->13         started        15 tibqanobatib.exe 47 2->15         started        signatures3 113 System process connects to network (likely due to code injection or exploit) 61->113 115 Tries to resolve many domain names, but no domain seems valid 63->115 process4 dnsIp5 87 awfraser.com 8->87 89 www.valselit.com 193.70.68.254 OVHFR France 8->89 95 174 other IPs or domains 8->95 57 C:\Users\user\tibqanobatib.exe, PE32 8->57 dropped 59 C:\Users\...\tibqanobatib.exe:Zone.Identifier, ASCII 8->59 dropped 119 Drops PE files to the user root directory 8->119 121 Writes to foreign memory regions 8->121 123 Allocates memory in foreign processes 8->123 17 svchost.exe 8->17         started        20 svchost.exe 8->20         started        23 svchost.exe 8->23         started        25 svchost.exe 8->25         started        91 nolaoig.org 13->91 93 www.t-tre.com 13->93 97 31 other IPs or domains 13->97 125 Multi AV Scanner detection for dropped file 13->125 127 Machine Learning detection for dropped file 13->127 129 Injects a PE file into a foreign processes 13->129 27 svchost.exe 13->27         started        29 svchost.exe 13->29         started        31 svchost.exe 13->31         started        33 svchost.exe 13->33         started        35 svchost.exe 15->35         started        file6 131 System process connects to network (likely due to code injection or exploit) 91->131 signatures7 process8 dnsIp9 99 Injects a PE file into a foreign processes 17->99 37 svchost.exe 12 17->37         started        41 svchost.exe 3 12 17->41         started        43 svchost.exe 12 17->43         started        45 svchost.exe 17->45         started        67 mail.airmail.net 66.226.70.66 INFB2-ASUS United States 20->67 69 sidepath.com 20->69 71 2 other IPs or domains 20->71 101 System process connects to network (likely due to code injection or exploit) 20->101 49 4 other processes 20->49 47 svchost.exe 12 23->47         started        51 3 other processes 23->51 103 Creates a thread in another existing process (thread injection) 27->103 53 2 other processes 27->53 55 2 other processes 31->55 signatures10 process11 dnsIp12 79 70 other IPs or domains 37->79 117 System process connects to network (likely due to code injection or exploit) 37->117 81 104 other IPs or domains 41->81 73 dayvo.com 43->73 83 82 other IPs or domains 43->83 75 nekono.net 47->75 85 60 other IPs or domains 47->85 77 alexpope.biz 49->77 signatures13
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2022-05-31 14:45:29 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
persistence suricata upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
UPX packed file
suricata: ET MALWARE Backdoor.Win32.Pushdo.s Checkin
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
Unpacked files
SH256 hash:
2667c1ba9a3c1f4b69b0adc75c2ce242373823927b3e5c94d5cb670274c28c93
MD5 hash:
8dbe23493c7ca72a67185942a642a211
SHA1 hash:
aab74fa20f0c9b641755cfc45d3c3df62928b78c
SH256 hash:
095a3f84debd7481b880016a770c211a793847f61c72499b4702b16fd9666b28
MD5 hash:
2a3acbec7baefea2c2b0eb20ff253eed
SHA1 hash:
1b77f4b3443037620ed75804e422fa347d146077
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Cutwail

Executable exe 095a3f84debd7481b880016a770c211a793847f61c72499b4702b16fd9666b28

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-06-03 06:52:26 UTC

url : hxxp://37.120.222.121/store/items/63.exe