MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1126fe74259bf7801bf1949dfa3af6659a46f5b19fabda52446bcc434c4ed162. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 14


Intelligence 14 IOCs YARA 1 File information Comments

SHA256 hash: 1126fe74259bf7801bf1949dfa3af6659a46f5b19fabda52446bcc434c4ed162
SHA3-384 hash: 6e78da61d0f0a3fd418bca7bc62ed90ac78f10e3b2ea03eba52152894b3273b7343b8d71c169c8ceb983c746bdec74ab
SHA1 hash: eef6b30a2edba78c5adae7b8936a9b4762bf804d
MD5 hash: a0440ff589a252adc9183609940f3bea
humanhash: lactose-pizza-ceiling-bakerloo
File name:a0440ff589a252adc9183609940f3bea.exe
Download: download sample
File size:2'422'749 bytes
First seen:2024-10-18 11:41:47 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 56075ba1bea23d7b1dcf68ef072a7c9b (1 x Sality)
ssdeep 49152:4w46z5zoX35n+ZO6ZtdpdjivaAmOl9RxBrHTxAXMG:Vz5SYBLpdjiaApl9RxBrHTxAX9
TLSH T169B533D15D6143E5C85A4EF0EF3EAA25035EA4C9012CB333E66D273D6C2F26E4E36685
TrID 27.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
20.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
18.6% (.EXE) Win32 Executable (generic) (4504/4/1)
8.5% (.ICL) Windows Icons Library (generic) (2059/9)
8.3% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
353
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
neutrino
ID:
1
File name:
e26ae55df4be457d8ecce0e06a3241ce
Verdict:
Malicious activity
Analysis date:
2024-10-18 08:13:49 UTC
Tags:
arch-exec themida wmi-base64 api-base64 neutrino

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
Powershell Gumen Spoof
Result
Threat name:
n/a
Detection:
malicious
Classification:
phis.troj.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes the view of files in windows explorer (hidden files and folders)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Disables the Smart Screen filter
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Monitors registry run keys for changes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Uses netsh to modify the Windows network and firewall settings
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1537007 Sample: oDut0EutE8.exe Startdate: 18/10/2024 Architecture: WINDOWS Score: 100 35 onyx.deepdns.cryptostorm.net 2->35 37 ns2.random.dns.d0wn.biz 2->37 39 10 other IPs or domains 2->39 45 Suricata IDS alerts for network traffic 2->45 47 Antivirus / Scanner detection for submitted sample 2->47 49 Multi AV Scanner detection for submitted file 2->49 51 3 other signatures 2->51 9 oDut0EutE8.exe 2 2->9         started        13 jevgr.exe 2->13         started        signatures3 process4 file5 33 C:\Users\user\AppData\Roaming\...\jevgr.exe, PE32 9->33 dropped 53 Query firmware table information (likely to detect VMs) 9->53 55 Hides threads from debuggers 9->55 57 Hides that the sample has been downloaded from the Internet (zone.identifier) 9->57 59 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 9->59 15 jevgr.exe 2 9->15         started        18 cmd.exe 1 9->18         started        61 Tries to detect sandboxes / dynamic malware analysis system (registry check) 13->61 63 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 13->63 signatures6 process7 signatures8 65 Antivirus detection for dropped file 15->65 67 Multi AV Scanner detection for dropped file 15->67 69 Query firmware table information (likely to detect VMs) 15->69 77 10 other signatures 15->77 20 jevgr.exe 4 15->20         started        23 cmd.exe 1 15->23         started        71 Uses ping.exe to sleep 18->71 73 Uses ping.exe to check the status of other devices and networks 18->73 75 Uses netsh to modify the Windows network and firewall settings 18->75 25 PING.EXE 1 18->25         started        27 conhost.exe 18->27         started        process9 dnsIp10 41 n.ddnsgratis.com.br 194.5.152.215, 49886, 49977, 49978 DEDIPATH-LLCUS Germany 20->41 29 conhost.exe 23->29         started        31 netsh.exe 2 23->31         started        43 127.0.0.1 unknown unknown 25->43 process11
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2024-10-18 08:01:57 UTC
File Type:
PE (Exe)
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
neutrino
Similar samples:
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery evasion persistence privilege_escalation themida trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Event Triggered Execution: Netsh Helper DLL
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Checks whether UAC is enabled
Checks BIOS information in registry
Deletes itself
Executes dropped EXE
Loads dropped DLL
Themida packer
Unexpected DNS network traffic destination
Drops file in Drivers directory
Modifies Windows Firewall
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Modifies visiblity of hidden/system files in Explorer
Unpacked files
SH256 hash:
57d837351e144623912af0a5ee1da4ee44a0b438792566de07b72e9fa11c0c4b
MD5 hash:
c1332c66a1bee205a68d8df80c89c37f
SHA1 hash:
5034fde41f33db5707d77522859ee08836816141
Detections:
win_neutrino_g2 INDICATOR_EXE_Packed_Themida
SH256 hash:
1126fe74259bf7801bf1949dfa3af6659a46f5b19fabda52446bcc434c4ed162
MD5 hash:
a0440ff589a252adc9183609940f3bea
SHA1 hash:
eef6b30a2edba78c5adae7b8936a9b4762bf804d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_Themida
Author:ditekSHen
Description:Detects executables packed with Themida

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments