MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0b6e07ef164c3e95b735471b8591de2622478afa19c0aa3dc6cacbf960f48a82. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: 0b6e07ef164c3e95b735471b8591de2622478afa19c0aa3dc6cacbf960f48a82
SHA3-384 hash: 1059b5d37b84832102753850ab950bb172352c167bbf6d65620676b243c92d3c35530de9975d2a72886ca1c8c3ff8dda
SHA1 hash: d6d7ca1a3fa7a8a6552979374f0c14145a1aa312
MD5 hash: 44f2272b05bb7b02198c3dfdef3faf9d
humanhash: london-delta-hawaii-ohio
File name:SecuriteInfo.com.Trojan.SMSSend.3052.27664.18035
Download: download sample
File size:1'333'614 bytes
First seen:2023-10-10 10:41:44 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e710feb0eb6204d1acb452f545c64c30
ssdeep 24576:duQNJ8TSyy5EI+vO1nyzWozeiQCp3P+vK/cRgOnmq9g6IB36rKX6RB6:duQNIAyc2Woz3H3PhcOU7m6slM6
Threatray 31 similar samples on MalwareBazaar
TLSH T1E65523F564ABCC87EB14D63F8410BD30466719B2539B8BBADAC8333FF562125EE15086
TrID 35.7% (.EXE) Win32 Executable (generic) (4505/5/1)
16.4% (.EXE) Win16/32 Executable Delphi generic (2072/23)
16.0% (.EXE) OS/2 Executable (generic) (2029/13)
15.8% (.EXE) Generic Win/DOS Executable (2002/3)
15.8% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon cca2aeccc486acdc
Reporter SecuriteInfoCom
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
279
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Sending a custom TCP request
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
asprotect lolbin ntkrnl_protector overlay packed packed packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.evad
Score:
72 / 100
Signature
Antivirus / Scanner detection for submitted sample
Contains functionality to modify clipboard data
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
PE file has nameless sections
Uses Windows timers to delay execution
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Zilix
Status:
Malicious
First seen:
2013-01-09 07:58:00 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
31 of 38 (81.58%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Unpacked files
SH256 hash:
76f484fdb1caf2c3cbe10f5f14d7f984970acfd78b6e9da7e4622bdf5218b604
MD5 hash:
542991bd01dd525a996ea84debbb15e5
SHA1 hash:
858df109281902e7493dd36c6f9ca2e31e64a63b
SH256 hash:
0b6e07ef164c3e95b735471b8591de2622478afa19c0aa3dc6cacbf960f48a82
MD5 hash:
44f2272b05bb7b02198c3dfdef3faf9d
SHA1 hash:
d6d7ca1a3fa7a8a6552979374f0c14145a1aa312
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ASProtect13321RegisteredAlexeySolodovnikov
Author:malware-lu
Rule name:ASProtectv123RC1
Author:malware-lu
Rule name:ASProtectv12xNewStrain
Author:malware-lu

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments