MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0bdaa27e390c5e15c3b27ae4f4168fbf97693f5d03fa0f70487c63c13030ffd8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Lu0Bot


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 0bdaa27e390c5e15c3b27ae4f4168fbf97693f5d03fa0f70487c63c13030ffd8
SHA3-384 hash: 3c0333ddb3e837ec21b12197da392d8e7de1f86f56e5310d3a9cbb5cec237193c46e31690805e1e401ee5349eaa2490c
SHA1 hash: f93989a4d3d83e67a970edda112f33c824e330df
MD5 hash: b52d4d8bce16a8f4165a8c8bf6844eb1
humanhash: kitten-eleven-bravo-pluto
File name:b52d4d8bce16a8f4165a8c8bf6844eb1
Download: download sample
Signature Lu0Bot
File size:2'187'264 bytes
First seen:2023-03-06 06:31:37 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 24576:6yDKBzT7QsrNwEvon+K/VNvAaNywOobdieEqyyXUDOi294YohFDVfmgV+uzYxh1/:B+BzT7Fhwq8HbETfDpeFgV+ph1TjRXw
Threatray 245 similar samples on MalwareBazaar
TLSH T166A5330A73E85133DC312B30A1F505C71832BCF56679472B2F46AD5D9CBA3686272B7A
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe Lu0Bot

Intelligence


File Origin
# of uploads :
1
# of downloads :
218
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
b52d4d8bce16a8f4165a8c8bf6844eb1
Verdict:
Malicious activity
Analysis date:
2023-03-06 06:34:30 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Creating a process from a recently created file
Сreating synchronization primitives
DNS request
Sending a UDP request
Sending a custom TCP request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
advpack.dll CAB cmd.exe installer packed rundll32.exe setupapi.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
56 / 100
Signature
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking system information)
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 820404 Sample: NAlFwwzxlf.exe Startdate: 06/03/2023 Architecture: WINDOWS Score: 56 24 Multi AV Scanner detection for submitted file 2->24 7 NAlFwwzxlf.exe 1 8 2->7         started        10 rundll32.exe 2->10         started        process3 file4 20 C:\Users\user\AppData\Local\...\edumkwhke.dat, PE32+ 7->20 dropped 12 cmd.exe 2 7->12         started        process5 file6 22 C:\Users\user\AppData\Local\...\conhost.exe, PE32 12->22 dropped 15 conhost.exe 1 12->15         started        18 conhost.exe 12->18         started        process7 signatures8 26 Found evasive API chain (may stop execution after checking system information) 15->26 28 Found API chain indicative of debugger detection 15->28
Result
Malware family:
n/a
Score:
  7/10
Tags:
persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Program crash
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
Unpacked files
SH256 hash:
0f37a9e185aab6e9fc6d0095d18699ff60befce1601aedd25c118c73a98cc7d8
MD5 hash:
470f7a10a38f02efbcba3863ff44b691
SHA1 hash:
f9579fe3171eef3d8bcd387f1ac1e002257d89d3
SH256 hash:
0bdaa27e390c5e15c3b27ae4f4168fbf97693f5d03fa0f70487c63c13030ffd8
MD5 hash:
b52d4d8bce16a8f4165a8c8bf6844eb1
SHA1 hash:
f93989a4d3d83e67a970edda112f33c824e330df
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments