MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0b36693f3ce4197006131e3f127e83807c8afc175da08f18dc0aaa454e6790e0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 4 File information Comments

SHA256 hash: 0b36693f3ce4197006131e3f127e83807c8afc175da08f18dc0aaa454e6790e0
SHA3-384 hash: 2e5669aa5b16d6a0f36c94ab3e2ac8d17707c504306a4d0fe59409f07578a7d4bc8184dac90ad783541e2aaf075e6b91
SHA1 hash: adb9c2dacff8386cc54eac3f96d28494c3fe68c5
MD5 hash: 7201884e2b338a79b14892911c14a7f0
humanhash: ten-hawaii-lemon-hydrogen
File name:0b36693f3ce4197006131e3f127e83807c8afc175da08f18dc0aaa454e6790e0
Download: download sample
File size:1'491'968 bytes
First seen:2021-10-08 07:44:35 UTC
Last seen:2021-10-08 09:05:08 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'748 x AgentTesla, 19'642 x Formbook, 12'245 x SnakeKeylogger)
ssdeep 24576:l+t0D9jaWAsmt2AbKd051/x6Osdu21Xq04SoQ6h/Aijym1LvbuhZUTdQn:+0gWAsmwAbKy1/YTdu21Xq0nJo/3JbM
Threatray 11 similar samples on MalwareBazaar
TLSH T1C065338CAE49CCABCF8512763C4621675A70EB5208418C81FCB92FE5CF4F75C6EB6189
Reporter JAMESWT_WT
Tags:Aerospace and Telecoms Firms exe Novel RAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
214
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0b36693f3ce4197006131e3f127e83807c8afc175da08f18dc0aaa454e6790e0
Verdict:
No threats detected
Analysis date:
2021-10-08 06:25:43 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
68 / 100
Signature
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Yara detected Costura Assembly Loader
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Heracles
Status:
Malicious
First seen:
2021-10-07 02:37:00 UTC
AV detection:
10 of 28 (35.71%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
Modifies data under HKEY_USERS
Modifies system certificate store
Suspicious use of AdjustPrivilegeToken
Drops file in System32 directory
Looks up external IP address via web service
Unpacked files
SH256 hash:
19e040305fb57592bb62b41c24e9b64162e1e082230a356a304a3193743b102d
MD5 hash:
3d8416cee742706e130e352ea95a6ba3
SHA1 hash:
ec374dc41d9f6a751bf876da990f99ef362e0e1b
SH256 hash:
d7aa669de0f8a0cdb898cf33ac38ae65461de3c8c0c313c82ee8d48e408e4c4d
MD5 hash:
c8bd4acd2977d63606362ab0375b1368
SHA1 hash:
964f4e1ab9ea3ca140e2b6323e2c80ba1fe343f7
SH256 hash:
4d30dfb1d66c7a472cca11c22962f466762a08c1dfcfb18a9f75b2e4cf7c38ee
MD5 hash:
9052b081d5aaa0349532dbfb25ec5e9d
SHA1 hash:
799c4aced22fe62b0879c45eb85aac9f189ce6dc
SH256 hash:
0b36693f3ce4197006131e3f127e83807c8afc175da08f18dc0aaa454e6790e0
MD5 hash:
7201884e2b338a79b14892911c14a7f0
SHA1 hash:
adb9c2dacff8386cc54eac3f96d28494c3fe68c5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_Fody
Author:ditekSHen
Description:Detects executables manipulated with Fody
Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments