MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0b9f5277e6d3a78fa0b945cf233c515059680e1440ccc32b5595a7fe1907a6c6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA 3 File information Comments

SHA256 hash: 0b9f5277e6d3a78fa0b945cf233c515059680e1440ccc32b5595a7fe1907a6c6
SHA3-384 hash: 2722a07615b44481bcf6e749bed3b0be723ed234f7ad18ee061933d07b730e0dd8e3a4db03b2b383798c02cd650b6b11
SHA1 hash: ca8254c1033e570e56c8a9860c88d824b73abd6c
MD5 hash: 343009b077f7573cb9ffe99907fe0310
humanhash: paris-mississippi-freddie-uniform
File name:0b9f5277e6d3a78fa0b945cf233c515059680e1440ccc32b5595a7fe1907a6c6
Download: download sample
File size:1'808'381 bytes
First seen:2022-11-02 12:07:58 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 24576:+DWHSb4Nc0dkK9yc6Hsf3Y0LL1l+2g5TMRO43yyUaCoVp2qaWJNF9B642fYfrAAu:t841Dfo0tl+2gNlGSaCoVpFN9xsAvG
Threatray 1'841 similar samples on MalwareBazaar
TLSH T1A4852301BE829572E5621D32866D6A60663C7D201F24CFEFB3D4162EAE311C0E775BB7
TrID 89.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.5% (.EXE) Win64 Executable (generic) (10523/12/4)
2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 9494b494d4aeaeac (832 x DCRat, 172 x RedLineStealer, 134 x CryptOne)
Reporter JAMESWT_WT
Tags:exe update-hilifimyanmar-com

Intelligence


File Origin
# of uploads :
1
# of downloads :
222
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0b9f5277e6d3a78fa0b945cf233c515059680e1440ccc32b5595a7fe1907a6c6
Verdict:
Malicious activity
Analysis date:
2022-11-02 12:08:59 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Sending a custom TCP request
Launching a process
Forced system process termination
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed setupapi.dll shdocvw.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
96 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Creates a thread in another existing process (thread injection)
Drops executables to the windows directory (C:\Windows) and starts them
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Aptx
Status:
Malicious
First seen:
2022-11-02 06:48:31 UTC
File Type:
PE (Exe)
Extracted files:
29
AV detection:
25 of 41 (60.98%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Modifies Internet Explorer settings
Suspicious use of SetWindowsHookEx
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
b01f2748830ffe3d9c4aabca76883d174a7d59e6e36d35361106b36054d677ad
MD5 hash:
f481cfd1cb1761ef1b5e3f3a6cd78bec
SHA1 hash:
dd3e598a45059f3ccbee1624eaa1e1caaf441f5f
SH256 hash:
04e5cdefc108769c3f31b6fb36e1957fdccc0920318a83e9bd4ad3a8ca855880
MD5 hash:
9c2b6efd77ba2a413a68293654119911
SHA1 hash:
b37a23aa3cbe3ab307f6088d2596f400df24b7dd
SH256 hash:
74fe609eb8f344405b41708a3bb3c39b9c1e12ff93232d4b7efe648d66ea7380
MD5 hash:
b17560333be41ad41305052e5c52e4eb
SHA1 hash:
61a2d34625706f17221c1110d36a435438bc0665
SH256 hash:
0b9f5277e6d3a78fa0b945cf233c515059680e1440ccc32b5595a7fe1907a6c6
MD5 hash:
343009b077f7573cb9ffe99907fe0310
SHA1 hash:
ca8254c1033e570e56c8a9860c88d824b73abd6c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:sfx_pdb
Author:@razvialex
Description:Detect interesting files containing sfx with pdb paths.
Rule name:sfx_pdb_winrar_restrict
Author:@razvialex
Description:Detect interesting files containing sfx with pdb paths.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments