MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0fbf811ae93abb614c13af884bd61a8408948d7a2fe3846641e737b49850b4da. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 0fbf811ae93abb614c13af884bd61a8408948d7a2fe3846641e737b49850b4da
SHA3-384 hash: 223a51d521ea1a766c2bbfc11c350f217d6ee9382b721ba7618bcfb4c64918fc621b95ba03a95e3727d6c2c1c1efca09
SHA1 hash: c7348436cde0e16545e641104c564801297a0e58
MD5 hash: bd8f29f01870538b19f05c5fe7f380ac
humanhash: carpet-lithium-finch-march
File name:0fbf811ae93abb614c13af884bd61a8408948d7a2fe3846641e737b49850b4da
Download: download sample
File size:1'408'228 bytes
First seen:2022-05-06 08:41:26 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 575ea90c069471216fa3adaba586119e (5 x Gh0stRAT, 2 x QuasarRAT, 1 x DarkComet)
ssdeep 24576:B/rSKYCz7+PuZ58dxHS2eO8k984ghHOrTWcAeLs3HIc/9y43i8R8XA+X14Y:B/eK0GZGk8TgwAeLoNyA8XnF/
Threatray 7'916 similar samples on MalwareBazaar
TLSH T1B6553333759D55A1C640C6B19A0CA838C7026EFCC554A45ECB8BBE5346F33E218EB6BD
TrID 35.7% (.EXE) UPX compressed Win32 Executable (27066/9/6)
35.0% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4)
8.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.9% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 8189a080a0a08080 (1 x Gh0stRAT, 1 x Metasploit)
Reporter JAMESWT_WT
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
243
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0fbf811ae93abb614c13af884bd61a8408948d7a2fe3846641e737b49850b4da
Verdict:
Malicious activity
Analysis date:
2022-05-06 08:54:21 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Creating a window
Creating a process with a hidden window
Searching for the window
Searching for synchronization primitives
Creating a file
Enabling the 'hidden' option for files in the %temp% directory
Running batch commands
Using the Windows Management Instrumentation requests
Launching a process
Reading critical registry keys
Sending a custom TCP request
Unauthorized injection to a recently created process
Launching a tool to kill processes
Stealing user critical data
Forced shutdown of a browser
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw.evad
Score:
81 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 621478 Sample: A9EyBW7QiJ Startdate: 06/05/2022 Architecture: WINDOWS Score: 81 74 Malicious sample detected (through community Yara rule) 2->74 76 Antivirus detection for dropped file 2->76 78 Antivirus / Scanner detection for submitted sample 2->78 80 7 other signatures 2->80 10 A9EyBW7QiJ.exe 10 2->10         started        process3 file4 62 C:\Users\user\...\tishiwenben -     .exe, PE32+ 10->62 dropped 64 C:\Users\user\AppData\Local\Temp\...\123.exe, PE32 10->64 dropped 13 123.exe 10 10->13         started        17 tishiwenben -     .exe 5 10->17         started        process5 file6 68 C:\Users\user\AppData\Local\Temp\Temp\Q.exe, PE32 13->68 dropped 70 C:\Users\user\...\ClemExternal_March_30.exe, PE32 13->70 dropped 98 Antivirus detection for dropped file 13->98 100 Multi AV Scanner detection for dropped file 13->100 102 Machine Learning detection for dropped file 13->102 19 ClemExternal_March_30.exe 9 13->19         started        23 Q.exe 10 13->23         started        25 wscript.exe 17->25         started        signatures7 process8 file9 54 C:\Users\user\...\ClemExternal_March_30.exe, PE32 19->54 dropped 56 C:\Users\user\AppData\...\ClemExternal.exe, PE32 19->56 dropped 82 Multi AV Scanner detection for dropped file 19->82 84 Machine Learning detection for dropped file 19->84 27 ClemExternal.exe 19->27         started        32 ClemExternal_March_30.exe 19->32         started        58 C:\Users\user\AppData\...\tishiwenben.exe, PE32+ 23->58 dropped 60 C:\Users\user\AppData\Local\...\slsup.com.exe, PE32 23->60 dropped 86 Antivirus detection for dropped file 23->86 34 slsup.com.exe 2 23->34         started        36 tishiwenben.exe 5 23->36         started        signatures10 process11 dnsIp12 72 95.143.179.147, 49750, 55555 RHTEC-ASrh-tecIPBackboneDE Russian Federation 27->72 66 Roaming2ig8YTtcGVF...APAvCNgF1M2pO1H.exe, PE32+ 27->66 dropped 88 Antivirus detection for dropped file 27->88 90 Multi AV Scanner detection for dropped file 27->90 92 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 27->92 94 Tries to harvest and steal browser information (history, passwords, etc) 27->94 38 conhost.exe 32->38         started        40 cmd.exe 32->40         started        96 Machine Learning detection for dropped file 34->96 42 cmd.exe 1 34->42         started        44 wscript.exe 36->44         started        file13 signatures14 process15 process16 46 conhost.exe 42->46         started        48 taskkill.exe 42->48         started        50 taskkill.exe 42->50         started        52 18 other processes 42->52
Threat name:
Win32.Trojan.Pandex
Status:
Malicious
First seen:
2022-04-22 17:11:00 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
26 of 26 (100.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
discovery evasion spyware stealer upx
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Checks installed software on the system
Maps connected drives based on registry
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Looks for VMWare Tools registry key
UPX packed file
Looks for VirtualBox Guest Additions in registry
Unpacked files
SH256 hash:
718b25aac4e9e1b48a06b30f389c75a406c261f47836e8033343b1b87c4e03f4
MD5 hash:
7e420cae149e55bc8d4e5b946c46ab9a
SHA1 hash:
421d6e01acae1052c1d75ca2c0dbf424203c6329
SH256 hash:
3bb374a6907a7812b9a9a6bbcbcf3eb40f02f618c216aae8ec3fb522a44d7b00
MD5 hash:
789067873f10aaf7d2fcf81d4634b582
SHA1 hash:
ffc0c5dac215a1f688ef2e987355e9def4e3c388
SH256 hash:
1a4afe0e18f3616cb46d3af998261ac6354417dc76295dabf34c39b564be186d
MD5 hash:
0a24ceac25ed8e3d4e574d7abd442048
SHA1 hash:
0331e32aa4960b4e372eeb77b04747c506b594d9
SH256 hash:
144ed897de341b8bee0548f5005981b37cc91a0317e695d43fa43a21154351d2
MD5 hash:
0c3e0ff82f274993751dfdb6ea11051b
SHA1 hash:
36861d90fe9f83f393225959d0574e74d3091f10
SH256 hash:
bc9914826d1763bff1e4ad9ac584153c2b0735f098742f07ddd241f9f205a89c
MD5 hash:
7b1737b5d1790a04af0fd6177b9f9c62
SHA1 hash:
ce186f779a3bf59453f32dc8b594b96c0a5dcab3
SH256 hash:
544eb4fc92f33d7a36ae0eba1259ac8096d1197b4f8b1abc9a2df40857cb12ee
MD5 hash:
ff18c8c7bea566ea40cf4cc429e9e5ca
SHA1 hash:
d0f9f484b9eabc675132ad3f8cbc41b5f2be8d68
SH256 hash:
0fbf811ae93abb614c13af884bd61a8408948d7a2fe3846641e737b49850b4da
MD5 hash:
bd8f29f01870538b19f05c5fe7f380ac
SHA1 hash:
c7348436cde0e16545e641104c564801297a0e58
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments