MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 10a042914c95c1fdd73931407a209f35f5e88d5f73c044112c2d69ba40e5ef50. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 3 File information Comments

SHA256 hash: 10a042914c95c1fdd73931407a209f35f5e88d5f73c044112c2d69ba40e5ef50
SHA3-384 hash: 88c10d363a4bd492dc29a0a11005a972c5fb52c0c3e8b122724bc547b1dc9f4a589962309d54c7795ecb5015cfe59609
SHA1 hash: 4f61e5c6c957d6aebfb356ff05108963fc0650df
MD5 hash: d0355bbbe5ac61b074ad4c518197a54f
humanhash: massachusetts-kansas-cold-six
File name:d0355bbbe5ac61b074ad4c518197a54f.exe
Download: download sample
File size:822'277 bytes
First seen:2020-12-18 16:27:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fc6683d30d9f25244a50fd5357825e79 (92 x Formbook, 52 x AgentTesla, 23 x SnakeKeylogger)
ssdeep 12288:zYV6MorX7qzuC3QHO9FQVHPF51jgcBcMIoQOG2ljh/eCOE/aP2BrbwjqSQZlH2vq:wBXu9HGaVHiFoQOHlVGEiPryf2vje
TLSH 730522C0E592F6DBD4B901FAB6729434762AEE1D117C2B062199B22939353873C7FC63
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
133
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
d0355bbbe5ac61b074ad4c518197a54f.exe
Verdict:
Malicious activity
Analysis date:
2020-12-18 16:28:54 UTC
Tags:
trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Unauthorized injection to a recently created process
DNS request
Sending a custom TCP request
Connection attempt
Sending a UDP request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
AutoIt script contains suspicious strings
Binary is likely a compiled AutoIt script file
Connects to many VNC servers (likely to brute force passwords)
Contains functionality to determine the online IP of the system
Contains functionality to inject code into remote processes
Drops PE files with benign system names
Injects a PE file into a foreign processes
Multi AV Scanner detection for domain / URL
Sigma detected: System File Execution Location Anomaly
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Uses IRC for communication with a C&C
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Nymeria
Status:
Malicious
First seen:
2020-12-18 16:28:06 UTC
AV detection:
16 of 48 (33.33%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Unpacked files
SH256 hash:
10a042914c95c1fdd73931407a209f35f5e88d5f73c044112c2d69ba40e5ef50
MD5 hash:
d0355bbbe5ac61b074ad4c518197a54f
SHA1 hash:
4f61e5c6c957d6aebfb356ff05108963fc0650df
SH256 hash:
e13363bbf9b185bfb1638d6980eb51ed765fed29f688507aeea44121a68f28e0
MD5 hash:
61f44c500c4cbc584e86ea6a6615f0f4
SHA1 hash:
8140aed2a97613367dd1343f3cc1a2dd9376cdd5
SH256 hash:
ca73c7ea6586e1c2928b9282f6809c54d731bdfbc56a8a06b8df77e79efb8e71
MD5 hash:
bb421b38db1169a87f4ece2ea58a7641
SHA1 hash:
29cbcb66ed36379c072057c0047c66b0afc57133
SH256 hash:
cf1711d994ebb3ff1cc26ffb7796ea417dce678e327e1b49dbd34b5e6e923ea2
MD5 hash:
1295e92b4b6e14b8646ba3a5b980f8c6
SHA1 hash:
44a3c06349b89c9e74048a38f5fdbc8c4d171d38
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Certutil_Decode_OR_Download
Author:Florian Roth
Description:Certutil Decode
Reference:Internal Research
Rule name:GoogleBot_UserAgent
Author:Florian Roth
Description:Detects the GoogleBot UserAgent String in an Executable
Reference:Internal Research
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 10a042914c95c1fdd73931407a209f35f5e88d5f73c044112c2d69ba40e5ef50

(this sample)

  
Delivery method
Distributed via web download

Comments