MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 095a3f84debd7481b880016a770c211a793847f61c72499b4702b16fd9666b28. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Cutwail
Vendor detections: 12
| SHA256 hash: | 095a3f84debd7481b880016a770c211a793847f61c72499b4702b16fd9666b28 |
|---|---|
| SHA3-384 hash: | dcf92311c2ba8b1e0b6d6c9e3f820472b6a3169e97bda7d58d481deb61b15577dc5a9de5d8cef354f1000b82c8fad834 |
| SHA1 hash: | 1b77f4b3443037620ed75804e422fa347d146077 |
| MD5 hash: | 2a3acbec7baefea2c2b0eb20ff253eed |
| humanhash: | low-beer-four-island |
| File name: | 2a3acbec7baefea2c2b0eb20ff253eed |
| Download: | download sample |
| Signature | Cutwail |
| File size: | 189'952 bytes |
| First seen: | 2022-06-03 06:52:25 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | cb379c000a7cf90a80518fa5bc4f4cb5 (2 x Smoke Loader, 1 x Cutwail, 1 x Loki) |
| ssdeep | 1536:lzmWRottrUPg+oX/FhukfrMzy/ihDYGe3D/mVvwspq3D4ojorTpPpIzuknMbusKV:laQorQY/fukI2WDYGosv/83wPG6bu3F |
| Threatray | 6 similar samples on MalwareBazaar |
| TLSH | T16604BE2473A0C0B6F0B32A305476CE629AFBB83215B8D04B3BD4177A6F616D09B75767 |
| TrID | 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 16.4% (.EXE) Win64 Executable (generic) (10523/12/4) 10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.0% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 5c59da3ce0c1c850 (36 x Stop, 33 x Smoke Loader, 26 x RedLineStealer) |
| Reporter | |
| Tags: | 32 Cutwail exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
984
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2a3acbec7baefea2c2b0eb20ff253eed
Verdict:
Malicious activity
Analysis date:
2022-06-03 06:54:19 UTC
Tags:
trojan sinkhole
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Сreating synchronization primitives
Creating a file
Enabling the 'hidden' option for recently created files
DNS request
Sending an HTTP POST request
Launching a process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Sending an HTTP POST request to an infection source
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Cutwail
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Creates a thread in another existing process (thread injection)
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Send many emails (e-Mail Spam)
System process connects to network (likely due to code injection or exploit)
Tries to resolve many domain names, but no domain seems valid
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2022-05-31 14:45:29 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
19 of 26 (73.08%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
Result
Malware family:
n/a
Score:
10/10
Tags:
persistence suricata upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
UPX packed file
suricata: ET MALWARE Backdoor.Win32.Pushdo.s Checkin
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
Unpacked files
SH256 hash:
2667c1ba9a3c1f4b69b0adc75c2ce242373823927b3e5c94d5cb670274c28c93
MD5 hash:
8dbe23493c7ca72a67185942a642a211
SHA1 hash:
aab74fa20f0c9b641755cfc45d3c3df62928b78c
SH256 hash:
b09b696f004f12700aeeb3a0b0cf51edfd929e28544e914864c594f8cab8230f
MD5 hash:
46c3f1b67361d87cd156691f84266d06
SHA1 hash:
72639db91282adaf93cfe1bb8f3cfdac35e11643
Detections:
win_pushdo_auto
Parent samples :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 hash:
095a3f84debd7481b880016a770c211a793847f61c72499b4702b16fd9666b28
MD5 hash:
2a3acbec7baefea2c2b0eb20ff253eed
SHA1 hash:
1b77f4b3443037620ed75804e422fa347d146077
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://37.120.222.121/store/items/63.exe