MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 09c46f76e5c6937e2bff245fcaa611f9148b6b0e9ab0e57a8184e24a156608ba. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Worm.Virut


Vendor detections: 12


Intelligence 12 IOCs YARA 3 File information Comments

SHA256 hash: 09c46f76e5c6937e2bff245fcaa611f9148b6b0e9ab0e57a8184e24a156608ba
SHA3-384 hash: 8504a5c0d5c580733e5a9f3ddfd6729f20372df15c1c333db9bb5b3c6e110fb50c7837cb3ee1ebd9f16657d5885d055d
SHA1 hash: 0999586066f28b5578d10f9eaed4dc679074922d
MD5 hash: 3272f00d1bfc3b5e3e2f378906f630f0
humanhash: bravo-comet-freddie-juliet
File name:09c46f76e5c6937e2bff245fcaa611f9148b6b0e9ab0e57a8184e24a156608ba
Download: download sample
Signature Worm.Virut
File size:131'072 bytes
First seen:2022-11-05 20:33:19 UTC
Last seen:2022-11-05 22:27:56 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9bbf057800f1961071b8027a405aa4a4 (1 x Worm.Virut)
ssdeep 3072:cTb0DNmwTP8JuUgZVHQkEBtavmlMeay6VTRs/vZJ:cMfrOLOvmlIy6VwZJ
Threatray 15'256 similar samples on MalwareBazaar
TLSH T194D3AE3F32EA8632E88788705186BF33D97A6D31192F5647FB805D673C608D96627E07
TrID 38.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
20.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
13.0% (.EXE) Win64 Executable (generic) (10523/12/4)
8.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon f1f8ece470f0b0b2 (7 x NanoCore, 2 x RemcosRAT, 2 x HawkEye)
Reporter DesdinovaOsint
Tags:exe Worm.Virut

Intelligence


File Origin
# of uploads :
2
# of downloads :
183
Origin country :
PT PT
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
09c46f76e5c6937e2bff245fcaa611f9148b6b0e9ab0e57a8184e24a156608ba
Verdict:
Suspicious activity
Analysis date:
2022-11-05 20:36:06 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the Windows directory
Creating a service
Launching a service
Creating a process from a recently created file
Searching for synchronization primitives
DNS request
Running batch commands
Creating a process with a hidden window
Launching a process
Forced system process termination
Enabling autorun for a service
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
backdoor greyware nitol packed sality virus virut yoddos
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes memory attributes in foreign processes to executable or writable
Contains functionality to detect sleep reduction / modifications
Creates a thread in another existing process (thread injection)
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries random domain names (often used to prevent blacklisting and sinkholes)
Snort IDS alert for network traffic
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to resolve many domain names, but no domain seems valid
Writes to foreign memory regions
Yara detected Virut
Behaviour
Behavior Graph:
Threat name:
Win32.Virus.Virut
Status:
Malicious
First seen:
2018-01-11 04:01:50 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
26 of 26 (100.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Drops file in Windows directory
Unexpected DNS network traffic destination
Executes dropped EXE
Modifies firewall policy service
Unpacked files
SH256 hash:
09c46f76e5c6937e2bff245fcaa611f9148b6b0e9ab0e57a8184e24a156608ba
MD5 hash:
3272f00d1bfc3b5e3e2f378906f630f0
SHA1 hash:
0999586066f28b5578d10f9eaed4dc679074922d
Detections:
win_yoddos_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Backdoor_Nitol_Jun17
Author:Florian Roth
Description:Detects malware backdoor Nitol - file wyawou.exe - Attention: this rule also matches on Upatre Downloader
Reference:https://goo.gl/OOB3mH
Rule name:Backdoor_Nitol_Jun17_RID2E8F
Author:Florian Roth
Description:Detects malware backdoor Nitol - file wyawou.exe - Attention: this rule also matches on Upatre Downloader
Reference:https://goo.gl/OOB3mH
Rule name:win_yoddos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.yoddos.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments