MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0c3fe692a41411694e7bf89729008d344351da7961755f0d7ba9c58249b37aa1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments 1

SHA256 hash: 0c3fe692a41411694e7bf89729008d344351da7961755f0d7ba9c58249b37aa1
SHA3-384 hash: afa944a0da14c5a42ccdda7fad30769ba1fa444dc8cb62f9a95bbe03752917babf5281a80cca243b1a0a28b0bdb0aed3
SHA1 hash: c0056d82096d9922ad6ffc7f8c7c28eece89f24a
MD5 hash: e9a6cf8b9db68aa6fcc88639b2a4ea49
humanhash: mobile-skylark-winter-purple
File name:0c3fe692a41411694e7bf89729008d344351da7961755f0d7ba9c58249b37aa1
Download: download sample
File size:695'430 bytes
First seen:2021-05-09 10:38:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9165ea3e914e03bda3346f13edbd6ccd (3 x ValleyRAT, 2 x QuasarRAT, 1 x Redosdru)
ssdeep 12288:4hm73Z9T0o1/wRShyQ9QHl2d6HGtz5cdI/dgjtkw549gJLuz5aB9Dwet/J:4hWJj/mShtu00GKjt9Bu1aBdwet/J
Threatray 82 similar samples on MalwareBazaar
TLSH BBE4121FA4344AB5F1BE5834B38A9F65CF397653B63856174A432F012EE0274CE9F18A
Reporter starsSk87264403
Tags:AntiAV exe flystudio KILLAV

Intelligence


File Origin
# of uploads :
1
# of downloads :
170
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
60 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.PUA.FlyStudio
Status:
Malicious
First seen:
2021-05-01 01:20:35 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Loads dropped DLL
Unpacked files
SH256 hash:
4bed8a6e4e1548fddee40927b438132b47ef2aca6e9beb06b89fcf7714726310
MD5 hash:
1eece63319e7c5f6718562129b1572f1
SHA1 hash:
089ea3a605639eb1292f6a2a9720f0b2801b0b6e
SH256 hash:
0c3fe692a41411694e7bf89729008d344351da7961755f0d7ba9c58249b37aa1
MD5 hash:
e9a6cf8b9db68aa6fcc88639b2a4ea49
SHA1 hash:
c0056d82096d9922ad6ffc7f8c7c28eece89f24a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-09 10:59:31 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [C0026.002] Data Micro-objective::XOR::Encode Data
2) [C0046] File System Micro-objective::Create Directory
3) [C0051] File System Micro-objective::Read File
4) [C0052] File System Micro-objective::Writes File
5) [C0018] Process Micro-objective::Terminate Process