MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 103978e2e56eadd042f998d75a56178c72a0448c6625802129f35cfb542a2059. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SliverFox
Vendor detections: 10
| SHA256 hash: | 103978e2e56eadd042f998d75a56178c72a0448c6625802129f35cfb542a2059 |
|---|---|
| SHA3-384 hash: | cde09f9b664f91c9a7b4e2ade3ed1f92708acd5d78f6421b1863cebfcb172c2751e93deb4398d7ac6b931ade9fc38115 |
| SHA1 hash: | c9d3d45d0a7845aa5614254b33db65899e21fe05 |
| MD5 hash: | 553286e3a2b453b78f5c9b29d1fd1404 |
| humanhash: | finch-india-wisconsin-lion |
| File name: | UOKnd.76309.05.exe |
| Download: | download sample |
| Signature | SliverFox |
| File size: | 66'457'619 bytes |
| First seen: | 2025-03-30 05:10:39 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | a696fee49ce9130172bc9713039474d2 (1 x SliverFox) |
| ssdeep | 1572864:BHfGgPIYGX3BUgnvDNGuATRj5QbkzW5ZUoMQnQ:NfeniYIu+QtUoMQnQ |
| TLSH | T1B4E78C6A96EC612DFC1AE331244615224B143E250AF85F8F71AC3507AF3B5F33A926DD |
| TrID | 41.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 21.7% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 13.8% (.EXE) Win64 Executable (generic) (10522/11/4) 6.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 5.9% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Magika | pebin |
| dhash icon | 64b0c9c8e8ee6c0c (1 x SliverFox) |
| Reporter | |
| Tags: | backdoor exe SilverFox SliverFox winos |
Intelligence
File Origin
# of uploads :
1
# of downloads :
614
Origin country :
JPVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
UOKnd.76309.05.exe
Verdict:
No threats detected
Analysis date:
2025-03-30 05:13:37 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
shellcode cobalt virus small
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Сreating synchronization primitives
Connection attempt to an infection source
Creating a file
Enabling the 'hidden' option for recently created files
Creating a process from a recently created file
Query of malicious DNS domain
Sending a TCP request to an infection source
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
action anti-vm anti-vm explorer fingerprint lolbin microsoft_visual_cc overlay packed packed packer_detected runonce
Verdict:
Malicious
Labled as:
Win64/Agent.DML
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
64 / 100
Signature
Drops PE files to the document folder of the user
Found direct / indirect Syscall (likely to bypass EDR)
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Tries to detect virtualization through RDTSC time measurements
Behaviour
Behavior Graph:
Score:
44%
Verdict:
Susipicious
File Type:
PE
Gathering data
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2025-03-30 05:11:18 UTC
File Type:
PE+ (Exe)
Extracted files:
99
AV detection:
16 of 24 (66.67%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
4/10
Tags:
link pdf
Behaviour
Suspicious behavior: EnumeratesProcesses
Verdict:
Malicious
Tags:
Win.Malware.Backdoorx-10039833-0 ta_abused_service
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| COM_BASE_API | Can Download & Execute components | ole32.dll::CoCreateInstance |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteW |
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CloseHandle KERNEL32.dll::CreateThread |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::LoadLibraryW KERNEL32.dll::GetStartupInfoW KERNEL32.dll::GetCommandLineA |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleW KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleMode KERNEL32.dll::GetConsoleCP |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CreateDirectoryW KERNEL32.dll::CreateFileW KERNEL32.dll::DeleteFileW KERNEL32.dll::FindFirstFileW VERSION.dll::GetFileVersionInfoSizeW VERSION.dll::GetFileVersionInfoW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegOpenKeyExW ADVAPI32.dll::RegQueryValueExW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::EmptyClipboard USER32.dll::OpenClipboard USER32.dll::CreateWindowExW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.