MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1170f43b961d12e5ca7f29ad56f36f877652ed93b8a00406edc3ea6176e0b9fa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA 2 File information Comments

SHA256 hash: 1170f43b961d12e5ca7f29ad56f36f877652ed93b8a00406edc3ea6176e0b9fa
SHA3-384 hash: 1423be9f1c0c5ab4e793b1eddc5e4cde062d2e003008dd4b014c25968779f56360b5e2300419e0b910f08e586262dded
SHA1 hash: 7ab2c304c8df807fd8496fcaa71f67dc3babb605
MD5 hash: 72f6dd5aa02f3ea25e3e8b50a047fe2e
humanhash: spring-london-equal-kentucky
File name:7dfb06d19b24b71a96c54b390d3e1bb8
Download: download sample
File size:18'183'591 bytes
First seen:2020-11-17 11:44:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a2ee8be04b77b512352e96bd58dd80e1
ssdeep 196608:xv+ocJjVYm1b/7kxjuWB97DNCcnUW2FJwfJqIo9+YOqU9+EiYuUGs7OKV9JU7JZC:V+o4xvR3WDDNCcn8IRQ+D7C26sE2/
TLSH 5D076001765EC28EED6A0DD4269FC4F9D6E86E0CDE46B863520463DF6CB739498230DE
Reporter seifreed

Intelligence


File Origin
# of uploads :
1
# of downloads :
55
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Threat name:
Win32.PUA.GameTool
Status:
Malicious
First seen:
2020-11-17 11:46:01 UTC
AV detection:
14 of 28 (50.00%)
Threat level:
  1/5
Verdict:
unknown
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Unpacked files
SH256 hash:
1170f43b961d12e5ca7f29ad56f36f877652ed93b8a00406edc3ea6176e0b9fa
MD5 hash:
72f6dd5aa02f3ea25e3e8b50a047fe2e
SHA1 hash:
7ab2c304c8df807fd8496fcaa71f67dc3babb605
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments