MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0adde4246aaa9fb3964d1d6cf3c29b1b13074015b250eb8e5591339f92e1e3ca. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DoNex


Vendor detections: 13


Intelligence 13 IOCs YARA 10 File information Comments

SHA256 hash: 0adde4246aaa9fb3964d1d6cf3c29b1b13074015b250eb8e5591339f92e1e3ca
SHA3-384 hash: 15a9b9231cf2f742c5afc4a337b55a274884bb42a8fb2170bb108d912d0435a03f6c7c0c85b874e1764ef0e54d97ad1a
SHA1 hash: 21eae7e488b145fa3618627da99c3234696c0f15
MD5 hash: 8a23347b733420472a1ec0a1eeada597
humanhash: xray-bulldog-single-delta
File name:8a23347b733420472a1ec0a1eeada597.exe
Download: download sample
Signature DoNex
File size:229'391 bytes
First seen:2024-03-08 19:18:16 UTC
Last seen:2024-03-08 21:24:03 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 8c15953665973cafd1715edd2e4e4284 (1 x DoNex)
ssdeep 3072:FnS2A9r4wpzL3syZUmMkZFfAQ2FUAElR8MRC3KevxEwYSidYj6zxe8pxU4iR:ZSFr4EzLvC1kP4Q7XlR8MRCXYZR5c/R
TLSH T1AD24AE21B580C831D9B30D7656FDD77ADA3DBA30172496DB53880669EE603E1B33CA1B
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4504/4/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter smica83
Tags:Donex exe Ransomware

Intelligence


File Origin
# of uploads :
2
# of downloads :
974
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0adde4246aaa9fb3964d1d6cf3c29b1b13074015b250eb8e5591339f92e1e3ca.exe
Verdict:
Malicious activity
Analysis date:
2024-03-07 18:47:14 UTC
Tags:
ransomware

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Creating a file
Creating a window
Launching a service
Changing a file
Launching a process
Using the Windows Management Instrumentation requests
Forced system process termination
Deleting volume shadow copies
Launching a tool to kill processes
Forced shutdown of a browser
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm cmd crypto expand lolbin obfuscated overlay shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Darkrace Ransomware
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
rans.troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Deletes shadow drive data (may be related to ransomware)
Excessive usage of taskkill to terminate processes
Found potential ransomware demand text
Found ransom note / readme
Found Tor onion address
Machine Learning detection for sample
May disable shadow drive data (uses vssadmin)
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for submitted file
Sigma detected: Delete shadow copy via WMIC
Sigma detected: Shadow Copies Deletion Using Operating Systems Utilities
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes a notice file (html or txt) to demand a ransom
Yara detected DoNex Ransomware
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1405024 Sample: r0U5XZSQJk.exe Startdate: 07/03/2024 Architecture: WINDOWS Score: 100 46 Antivirus / Scanner detection for submitted sample 2->46 48 Multi AV Scanner detection for submitted file 2->48 50 Found ransom note / readme 2->50 52 6 other signatures 2->52 7 r0U5XZSQJk.exe 2 27 2->7         started        process3 file4 36 C:\Users\user\...\Readme.f58A66B51.txt, ASCII 7->36 dropped 38 C:\Users\user\...\Readme.f58A66B51.txt, ASCII 7->38 dropped 40 C:\Users\user\...\Readme.f58A66B51.txt, ASCII 7->40 dropped 42 7 other malicious files 7->42 dropped 54 Found potential ransomware demand text 7->54 56 Found Tor onion address 7->56 58 Deletes shadow drive data (may be related to ransomware) 7->58 60 2 other signatures 7->60 11 cmd.exe 1 7->11         started        14 cmd.exe 1 7->14         started        16 cmd.exe 1 7->16         started        signatures5 process6 signatures7 64 Uses ping.exe to sleep 11->64 66 Uses ping.exe to check the status of other devices and networks 11->66 68 Excessive usage of taskkill to terminate processes 11->68 18 PING.EXE 1 11->18         started        21 taskkill.exe 1 11->21         started        23 taskkill.exe 1 11->23         started        34 32 other processes 11->34 70 May disable shadow drive data (uses vssadmin) 14->70 72 Deletes shadow drive data (may be related to ransomware) 14->72 25 vssadmin.exe 1 14->25         started        28 conhost.exe 14->28         started        30 WMIC.exe 1 16->30         started        32 conhost.exe 16->32         started        process8 dnsIp9 44 127.0.0.1 unknown unknown 18->44 62 Deletes shadow drive data (may be related to ransomware) 25->62 signatures10
Threat name:
Win32.Ransomware.Darkrace
Status:
Malicious
First seen:
2024-03-05 20:26:11 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
31 of 38 (81.58%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
ransomware
Behaviour
Interacts with shadow copies
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Runs ping.exe
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Enumerates physical storage devices
Program crash
Enumerates connected drives
Deletes shadow copies
Renames multiple (126) files with added filename extension
Unpacked files
SH256 hash:
0adde4246aaa9fb3964d1d6cf3c29b1b13074015b250eb8e5591339f92e1e3ca
MD5 hash:
8a23347b733420472a1ec0a1eeada597
SHA1 hash:
21eae7e488b145fa3618627da99c3234696c0f15
Detections:
SUSP_XORed_URL_In_EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CMD_Ping_Localhost
Rule name:CMD_Shutdown
Author:adm1n_usa32
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:SUSP_XORed_URL_In_EXE
Author:Florian Roth (Nextron Systems)
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834
Rule name:SUSP_XORed_URL_in_EXE_RID2E46
Author:Florian Roth
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::AllocateAndInitializeSid
ADVAPI32.dll::EqualSid
ADVAPI32.dll::FreeSid
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::GetTokenInformation
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::OpenProcess
ADVAPI32.dll::OpenProcessToken
ADVAPI32.dll::OpenThreadToken
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetDriveTypeW
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineA
KERNEL32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WinExec
KERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileMappingA
KERNEL32.dll::CreateFileW
KERNEL32.dll::CreateFileA
KERNEL32.dll::MoveFileExW
KERNEL32.dll::FindFirstFileW
WIN_CRYPT_APIUses Windows Crypt APIADVAPI32.dll::CryptAcquireContextA
ADVAPI32.dll::CryptGenRandom
WIN_NETWORK_APISupports Windows NetworkingMPR.dll::WNetAddConnection2A
MPR.dll::WNetAddConnection2W
MPR.dll::WNetEnumResourceW
MPR.dll::WNetOpenEnumW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExA
ADVAPI32.dll::RegSetValueExA
WIN_SVC_APICan Manipulate Windows ServicesADVAPI32.dll::ControlService
ADVAPI32.dll::EnumDependentServicesA
ADVAPI32.dll::OpenSCManagerA
ADVAPI32.dll::OpenServiceA
ADVAPI32.dll::QueryServiceStatusEx
WIN_USER_APIPerforms GUI ActionsUSER32.dll::FindWindowA

Comments