MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
StrongPity
Vendor detections: 10
| SHA256 hash: | 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98 |
|---|---|
| SHA3-384 hash: | 2e9345b7dc9b8da3df6a5d0c522c49495419a9b74dc22539d5891cc3272aa91878fd2b4a843e19c0a20f18f7b26b25b9 |
| SHA1 hash: | 71b54d8219ab3a44ac434c41495c8d0db62a7d3f |
| MD5 hash: | 6d0fd5f76fbe861695b140828aac6443 |
| humanhash: | river-ceiling-pennsylvania-white |
| File name: | 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98 |
| Download: | download sample |
| Signature | StrongPity |
| File size: | 2'542'080 bytes |
| First seen: | 2021-03-14 12:02:34 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 2615839934fefd2d342149f561ecc715 (1 x StrongPity) |
| ssdeep | 49152:SFZvQ2hj5O98dmZUprMCLFJVAbNudznHvT+xcSvywAW:SfI2hjQdyM8X5PaIw |
| Threatray | 12 similar samples on MalwareBazaar |
| TLSH | 2CC522D9E4C580D8C83BBEF44A9C1CA8E235ED216854F5762FCDFC451E9319239A98B3 |
| Reporter | |
| Tags: | apt APT-C-41 StrongPity |
Intelligence
File Origin
# of uploads :
1
# of downloads :
1'365
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98
Verdict:
Malicious activity
Analysis date:
2021-03-14 12:02:57 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
StrongPity
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Creating a file
Creating a process from a recently created file
Creating a window
Reading critical registry keys
Enabling the 'hidden' option for files in the %temp% directory
Delayed writing of the file
Sending a UDP request
DNS request
Sending a custom TCP request
Deleting a recently created file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Stealing user critical data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
StrongPity
Detection:
suspicious
Classification:
troj.evad
Score:
36 / 100
Signature
Changes security center settings (notifications, updates, antivirus, firewall)
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected StrongPity
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.CrypterX
Status:
Malicious
First seen:
2021-03-11 11:10:13 UTC
File Type:
PE (Exe)
Extracted files:
9
AV detection:
18 of 28 (64.29%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
suspicious
Similar samples:
+ 2 additional samples on MalwareBazaar
Result
Malware family:
strongpity
Score:
10/10
Tags:
family:strongpity persistence spyware stealer
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
StrongPity
StrongPity Spyware
Unpacked files
SH256 hash:
b43b899f195e9002a384c4d3e0c6c07012a0bd167b018ef0cf224b6b57c02dfe
MD5 hash:
0892ce7f20c8447bf8f79f1bf1309cd8
SHA1 hash:
8498879ba6ba00575764ae2e32838bd922533ab1
SH256 hash:
d9402b75daf385ed652cc1d8c3bf7f3ea306fbc16996dead5a8741eff4f54b2f
MD5 hash:
f050cfe9ded513f1b8e9a4846a0fa3a7
SHA1 hash:
64cb47c16c5636bdc5046107480aa3c7c97a2bf3
SH256 hash:
32f45afe803e6eeb58028c0c03299a9aba89102146bbe4bf43f7e166cd3cdf69
MD5 hash:
e581b15bc5a7e28d7d5ffcb6c66333e4
SHA1 hash:
a39090da0daf3c66e809d82cc532aa5506ce0c6f
SH256 hash:
db691dd9c0cecf92cb38cce85a523fe693b3aca209bf641aa5992e2414047082
MD5 hash:
ab9aafa76a645153185eb2d093a138cc
SHA1 hash:
7b5fa06ec284fcb2d89e309d1bcff782ab08a178
SH256 hash:
a18729278f7b9f395628e429da306941d946992447dcaeb7acdeb81425292680
MD5 hash:
eaf33883e81817888b13f2e57da6eb1d
SHA1 hash:
5616a687118cc29d3f814143d68ae6893b8aef44
SH256 hash:
d6e0ffd05c5cdb43cbdea5056dc8e74fba891a660f48ae9d16399d907c22e7bf
MD5 hash:
794e2d3f52bd11fc9de214456c9d9be6
SHA1 hash:
52d179042aedd6f9cf79c32d58b7543fb63a6cc4
SH256 hash:
0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98
MD5 hash:
6d0fd5f76fbe861695b140828aac6443
SHA1 hash:
71b54d8219ab3a44ac434c41495c8d0db62a7d3f
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Kryptik
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.