MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 10cc2de88fbbbc389b48ba140b79bfdbce43173ab2ea5f7ed79b48314802646a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 10cc2de88fbbbc389b48ba140b79bfdbce43173ab2ea5f7ed79b48314802646a
SHA3-384 hash: 8c09f73c146a602a19c87fbc836e350d156df0992e37a4b8a41e97f6c752ca083bda7a3762d6a18c84848422d66b3eb1
SHA1 hash: 8b77f5e6656230001989cc3d828aa43ce445aaac
MD5 hash: d0cc2d9d58432cf09c6aac7856f75b93
humanhash: oven-johnny-tango-kilo
File name:Nitro Generator - Linkvertise Downloader_X7-KHW1.exe
Download: download sample
File size:2'705'872 bytes
First seen:2021-11-20 22:12:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5a594319a0d69dbc452e748bcf05892e (21 x ParallaxRAT, 20 x Gh0stRAT, 15 x NetSupport)
ssdeep 49152:+qe3f6atzD7+H98AHaCfu60WmHCL+WuTmuKwEt:vSiwD7E9vButWmHCK5NKXt
Threatray 179 similar samples on MalwareBazaar
TLSH T144C5D03FB2EA6D7EC47A06394572929858376E70641A8CDA07FC250DCF27460BE3B715
File icon (PE):PE icon
dhash icon f87cb68aca92c9c8 (1 x Adware.Generic, 1 x Sality)
Reporter JaffaCakes118
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
106
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Seebri - Linkvertise Downloader_JBUg-l1.exe
Verdict:
Suspicious activity
Analysis date:
2021-11-18 17:51:02 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
DNS request
Sending a custom TCP request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
virus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
evad
Score:
30 / 100
Signature
Multi AV Scanner detection for submitted file
Obfuscated command line found
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 525639 Sample: Nitro Generator - Linkverti... Startdate: 20/11/2021 Architecture: WINDOWS Score: 30 90 Multi AV Scanner detection for submitted file 2->90 92 Obfuscated command line found 2->92 8 Nitro Generator - Linkvertise Downloader_X7-KHW1.exe 2 2->8         started        12 msiexec.exe 25 2->12         started        process3 file4 50 Nitro Generator - ...nloader_X7-KHW1.tmp, PE32 8->50 dropped 98 Obfuscated command line found 8->98 14 Nitro Generator - Linkvertise Downloader_X7-KHW1.tmp 9 41 8->14         started        52 C:\Windows\Installer\MSIFE81.tmp, PE32+ 12->52 dropped 54 C:\Windows\Installer\MSIFC2F.tmp, PE32+ 12->54 dropped 56 C:\Windows\Installer\MSIFA3A.tmp, PE32+ 12->56 dropped 58 16 other files (none is malicious) 12->58 dropped 18 msiexec.exe 12->18         started        20 msiexec.exe 12->20         started        signatures5 process6 dnsIp7 84 8.8.8.8 GOOGLEUS United States 14->84 86 13.224.194.156 AMAZON-02US United States 14->86 88 3 other IPs or domains 14->88 60 C:\Users\user\AppData\...\ccsetup586_slim.exe, PE32 14->60 dropped 62 C:\Users\user\AppData\...\zbShieldUtils.dll, PE32 14->62 dropped 64 C:\Users\user\AppData\Local\...\botva2.dll, PE32 14->64 dropped 66 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 14->66 dropped 22 ccsetup586_slim.exe 41 67 14->22         started        27 chrome.exe 176 14->27         started        29 msiexec.exe 1 14->29         started        68 C:\Users\user\AppData\Local\...\CloseFAH.exe, PE32 18->68 dropped 31 CloseFAH.exe 18->31         started        file8 process9 dnsIp10 76 151.101.0.64 FASTLYUS United States 22->76 78 5.62.40.203 AVAST-AS-DCCZ United Kingdom 22->78 82 3 other IPs or domains 22->82 42 C:\Users\user\AppData\Local\Temp\...\pfBL.dll, PE32 22->42 dropped 44 C:\Users\user\AppData\Local\...\nsProcess.dll, PE32 22->44 dropped 46 C:\Users\user\AppData\Local\...\inetc.dll, PE32 22->46 dropped 48 66 other files (none is malicious) 22->48 dropped 94 Query firmware table information (likely to detect VMs) 22->94 96 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 22->96 80 239.255.255.250 unknown Reserved 27->80 33 chrome.exe 27->33         started        36 chrome.exe 27->36         started        38 chrome.exe 27->38         started        40 conhost.exe 31->40         started        file11 signatures12 process13 dnsIp14 70 23.35.236.201 ZAYO-6461US United States 33->70 72 162.252.214.5 TUT-ASUS United States 33->72 74 62 other IPs or domains 33->74
Threat name:
Win32.Trojan.OfferCore
Status:
Malicious
First seen:
2021-11-15 11:06:06 UTC
AV detection:
15 of 28 (53.57%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies system certificate store
Script User-Agent
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
8dc40627fa4c09f7fd6df78e3ad03d7db3767010e15418dba24e63754dcbc59b
MD5 hash:
74fad5c6cd2d3af1fa257b5e9531993a
SHA1 hash:
ab701031918456195cf9a12a8b33f9417a9f6496
SH256 hash:
10cc2de88fbbbc389b48ba140b79bfdbce43173ab2ea5f7ed79b48314802646a
MD5 hash:
d0cc2d9d58432cf09c6aac7856f75b93
SHA1 hash:
8b77f5e6656230001989cc3d828aa43ce445aaac
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 10cc2de88fbbbc389b48ba140b79bfdbce43173ab2ea5f7ed79b48314802646a

(this sample)

  
Delivery method
Distributed via web download

Comments