MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0d8975a53ce7f4ad061991650e5106fa16508beaa72d32e62fa4f3bd0d86006f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Adware.Generic


Vendor detections: 7


Intelligence 7 IOCs YARA 4 File information Comments

SHA256 hash: 0d8975a53ce7f4ad061991650e5106fa16508beaa72d32e62fa4f3bd0d86006f
SHA3-384 hash: e3baa0b185f8f2e07bba076f92b754ac3074e28796f408e019eb6eefadd18ac8d66963cf66f5382b4d0c09d42aa3a71b
SHA1 hash: 997d65e27f27ff7ffb00cfcce96058496e992825
MD5 hash: 528e7141869861ec3da7c094de54e224
humanhash: summer-fix-lima-carolina
File name:SecuriteInfo.com.Program.Unwanted.5387.22420.32496
Download: download sample
Signature Adware.Generic
File size:31'651'736 bytes
First seen:2024-02-05 07:40:42 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e569e6f445d32ba23766ad67d1e3787f (263 x Adware.Generic, 41 x RecordBreaker, 24 x RedLineStealer)
ssdeep 786432:ZzbBqYCYV23hu8qvSI79IOKho3tP4o1AAAQWVk3xy15:hbBqF8dvSI79IOKS3tPRAAAQdy15
Threatray 4 similar samples on MalwareBazaar
TLSH T19A673337F225B93EC82912324172D22005BB7F1A64164C5E6BE42D0DFB7F1912EBEE59
TrID 39.3% (.EXE) Inno Setup installer (107240/4/30)
21.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
15.7% (.EXE) InstallShield setup (43053/19/16)
15.2% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
3.8% (.EXE) Win64 Executable (generic) (10523/12/4)
File icon (PE):PE icon
dhash icon e8dad4c8accc8cdc (11 x Adware.Generic)
Reporter SecuriteInfoCom
Tags:Adware.Generic exe signed

Code Signing Certificate

Organisation:Versacor Offshore Software Private Limited
Issuer:DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
Algorithm:sha256WithRSAEncryption
Valid from:2023-11-02T00:00:00Z
Valid to:2024-11-08T23:59:59Z
Serial number: 09cdc9c0c9685fdb9a06e83815f7eb6c
Intelligence: 11 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 504c1ba5a2c5ff9391ebec0ca2501fbfc6935870dd7780727680f4bcd0af1e6c
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
323
Origin country :
FR FR
Vendor Threat Intelligence
Verdict:
No Threat
Threat level:
  10/10
Confidence:
100%
Tags:
fingerprint installer lolbin overlay packed setupapi shell32
Result
Verdict:
MALICIOUS
Result
Threat name:
n/a
Detection:
suspicious
Classification:
n/a
Score:
24 / 100
Signature
Malicious sample detected (through community Yara rule)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1386560 Sample: SecuriteInfo.com.Program.Un... Startdate: 05/02/2024 Architecture: WINDOWS Score: 24 66 Malicious sample detected (through community Yara rule) 2->66 8 SecuriteInfo.com.Program.Unwanted.5387.22420.32496.exe 2 2->8         started        11 msiexec.exe 301 147 2->11         started        13 rundll32.exe 2->13         started        process3 file4 38 SecuriteInfo.com.P...387.22420.32496.tmp, PE32 8->38 dropped 15 SecuriteInfo.com.Program.Unwanted.5387.22420.32496.tmp 43 96 8->15         started        40 C:\Windows\WinSxS\InstallTemp\...\vcomp.dll, PE32 11->40 dropped 42 C:\Windows\WinSxS\...\mfc80KOR.dll, PE32 11->42 dropped 44 C:\Windows\WinSxS\...\mfc80JPN.dll, PE32 11->44 dropped 46 37 other files (none is malicious) 11->46 dropped 18 msiexec.exe 11->18         started        20 msiexec.exe 11->20         started        process5 file6 48 C:\Users\user\AppData\Local\...\isskin.dll, PE32 15->48 dropped 50 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 15->50 dropped 52 C:\Users\user\AppData\...\Vistab.cjstyles, PE32 15->52 dropped 54 74 other files (none is malicious) 15->54 dropped 22 chrome.exe 9 15->22         started        25 vcredist_x64.exe 1 20 15->25         started        27 vcredist_x86.exe 1 4 15->27         started        29 2 other processes 15->29 process7 dnsIp8 56 192.168.2.5, 443, 49692, 49705 unknown unknown 22->56 58 239.255.255.250 unknown Reserved 22->58 31 chrome.exe 22->31         started        34 msiexec.exe 1 25->34         started        36 msiexec.exe 1 27->36         started        process9 dnsIp10 60 accounts.google.com 142.250.105.84, 443, 49717 GOOGLEUS United States 31->60 62 www.google.com 142.250.9.105, 443, 49760, 49769 GOOGLEUS United States 31->62 64 5 other IPs or domains 31->64
Gathering data
Result
Malware family:
n/a
Score:
  4/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Executes dropped EXE
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments