MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0d81c64a88e6a5be04fe2b01fd872b7990c4e65becb31f1c5ad578dadff81a07. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 0d81c64a88e6a5be04fe2b01fd872b7990c4e65becb31f1c5ad578dadff81a07
SHA3-384 hash: 31ff267efcd62639252b4bfb320fd4edd1fd65d6bc745759d4c84461b1c7b8fff7a80854ffd9e6c84c84699c7fea10fa
SHA1 hash: 34d67ddbcce2099d3e8bd05b59cd21f9cef9831f
MD5 hash: a281b1994a956e501054a2d6ca1e2d4c
humanhash: lake-wisconsin-quebec-blossom
File name:a281b1994a956e501054a2d6ca1e2d4c
Download: download sample
File size:212'992 bytes
First seen:2020-11-17 11:59:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 03ae0108c7455c49c94d2d60afa1e57a (1 x Worm.Ramnit)
ssdeep 3072:o1pO4JRVzK2HFTDNoc+W+6jPwYTNwhxteUauGP/TZS04pLthEjQT6j:kYGDNBqc+7fMCIUatQ0kEj1
Threatray 123 similar samples on MalwareBazaar
TLSH 4A246C02B65EC041D867C539CEF5DEDD1ABA7C92EAA2C7AFAD0933DE18325544C46323
Reporter seifreed

Intelligence


File Origin
# of uploads :
1
# of downloads :
56
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the Windows subdirectories
Running batch commands
Creating a process with a hidden window
Launching the default Windows debugger (dwwin.exe)
Creating a process from a recently created file
Creating a file in the Windows directory
Threat name:
Win32.Trojan.Aenjaris
Status:
Malicious
First seen:
2020-11-07 15:01:05 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Program crash
Drops file in Windows directory
Drops file in System32 directory
Loads dropped DLL
Executes dropped EXE
ServiceHost packer
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
0d81c64a88e6a5be04fe2b01fd872b7990c4e65becb31f1c5ad578dadff81a07
MD5 hash:
a281b1994a956e501054a2d6ca1e2d4c
SHA1 hash:
34d67ddbcce2099d3e8bd05b59cd21f9cef9831f
SH256 hash:
e8ad8c29b8faff6be4caa6d8b0269face473da4982be979f45589bdc415afd89
MD5 hash:
a7277cacc6e914a0eab6706116514a50
SHA1 hash:
d647770ec6f310d9c784ac8c4fa76a8c6f48eb15
SH256 hash:
2e0cfcb0626d84d7f583b68fb47fe7e701a9b35ed5792c42b70f046ed73fc8ab
MD5 hash:
30eb079c6cd8c110561f378045d93900
SHA1 hash:
bc07d42c077895df285b47e275ab92a012154cdb
SH256 hash:
3129e759aa7189952d55449e870a45d6254f0ebb18f6e005bb51b88caef64f69
MD5 hash:
6251a90c9d2602804ac01b812b59034c
SHA1 hash:
25ba905458f18fef8bf90bca033213b5307a2568
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments