MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0cebe68cbe06a390acee24c33155bb1d9910d4edcb660d0d235ce2a4e3c643c5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gamaredon


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 0cebe68cbe06a390acee24c33155bb1d9910d4edcb660d0d235ce2a4e3c643c5
SHA3-384 hash: 3800399824434bf361bc218205f8d8a52748172b9859b6b690de7b7fec6c85d12b21379fbc3e7bd04cc8137f6e3d6165
SHA1 hash: 6dd36351ad0a453c93315f6ba0819d6d8c2340b9
MD5 hash: 70a4235b82919949c185adb7b28baff3
humanhash: apart-island-butter-nevada
File name:0cebe68cbe06a390acee24c33155bb1d9910d4edcb660d0d235ce2a4e3c643c5.hta
Download: download sample
Signature Gamaredon
File size:8'160 bytes
First seen:2025-02-12 19:43:35 UTC
Last seen:Never
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 192:8PRySVgvD5Fh35KkFK5tIU7aTIyXhjOv2LoCv0Ef2x7JXG/+ya0NKJxPgVJ:8PDVgvDbh35KKKDIsyXhjSwv0tx7JXGP
TLSH T1F2F12B6FF8738244279914DA98A16E487E86011EF9B165E3F3C14363104B9F0BADE5FE
Magika txt
Reporter smica83
Tags:gamaredon hta

Intelligence


File Origin
# of uploads :
1
# of downloads :
95
Origin country :
HU HU
Vendor Threat Intelligence
Verdict:
Suspicious
Score:
50%
Tags:
overt spawn
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Payload URLs
URL
File name
https://www.ukr.net/
HTA File
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
lolbin mshta
Result
Verdict:
UNKNOWN
Result
Threat name:
n/a
Detection:
clean
Classification:
n/a
Score:
3 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Downloader.ShortSeek
Status:
Malicious
First seen:
2025-02-12 13:26:49 UTC
File Type:
Text (HTML)
Extracted files:
1
AV detection:
4 of 38 (10.53%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery
Behaviour
Modifies Internet Explorer settings
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Checks computer location settings
Blocklisted process makes network request
Downloads MZ/PE file
Malware Config
Dropper Extraction:
https://vehicle-terror-code-making.trycloudflare.com/SSU/dipRBX/partnerVdK.tif
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments