MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 149741274dbc5dc82d83766d39bcfb918f8ac5757e0002b1ab5c56f6e6648074. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 6 File information Comments

SHA256 hash: 149741274dbc5dc82d83766d39bcfb918f8ac5757e0002b1ab5c56f6e6648074
SHA3-384 hash: 34d83c1e428cddeaa3987da31b77dac47789504cca0df74ca283a544b91d94a0b5c8c795ae48b1db0f861ed2bce54f68
SHA1 hash: 9a13c3250ac9f5237635d8b5929cfb1abf818897
MD5 hash: d6b67604eac1db8a24648aeb39a5b55b
humanhash: maine-harry-leopard-carolina
File name:d6b67604eac1db8a24648aeb39a5b55b.exe
Download: download sample
File size:3'336'150 bytes
First seen:2022-10-13 11:54:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d5e0355f8764c235b38759b860077ceb (1 x Adware.QQpass, 1 x CoinMiner)
ssdeep 98304:1HrpFxq0GOQ7ZZBji1a1ux76Dl4bY4t+34AezeV2:1zUi1ZNWMtFE2
Threatray 4'065 similar samples on MalwareBazaar
TLSH T195F5336C68EB9B91FFBF96B874189D27682C90953B407451C9BA0F2CF2EC44773062D6
TrID 29.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
22.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
20.3% (.EXE) Win32 Executable (generic) (4505/5/1)
9.1% (.EXE) OS/2 Executable (generic) (2029/13)
9.0% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon a661d572b3b0f0f2 (1 x Adware.QQpass, 1 x CoinMiner)
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
200
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Сreating synchronization primitives
Sending an HTTP GET request
Sending a custom TCP request
Creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
80 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 722401 Sample: XUvyH9PDhe.exe Startdate: 13/10/2022 Architecture: WINDOWS Score: 80 24 qzonestyle.mid.tdnsv6.com 2->24 26 qzonestyle.gtimg.cn.sched.legopic2.tdnsv6.com 2->26 28 4 other IPs or domains 2->28 46 Antivirus detection for URL or domain 2->46 48 Antivirus / Scanner detection for submitted sample 2->48 50 Multi AV Scanner detection for dropped file 2->50 52 3 other signatures 2->52 7 XUvyH9PDhe.exe 3 64 2->7         started        11 chrome.exe 15 2->11         started        signatures3 process4 dnsIp5 30 ins-ck07kq9h.ias.tencent-cloud.net 129.226.103.162, 443, 49745, 49746 TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCN Singapore 7->30 32 ins-2n7ixenz.ias.tencent-cloud.net 129.226.106.26, 443, 49771 TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCN Singapore 7->32 38 22 other IPs or domains 7->38 16 C:\Users\user\AppData\Local\...\xplib.fne, PE32 7->16 dropped 18 C:\Users\user\AppData\Local\Temp\...\spec.fne, PE32 7->18 dropped 20 C:\Users\user\AppData\Local\...\shell.fne, PE32 7->20 dropped 22 14 other malicious files 7->22 dropped 34 192.168.2.1 unknown unknown 11->34 36 239.255.255.250 unknown Reserved 11->36 13 chrome.exe 11->13         started        file6 process7 dnsIp8 40 downv6.qq.com.sched.dlied1.tdnsv5.com 119.28.164.31, 443, 49803, 49804 TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCN China 13->40 42 qzonestyle.gtimg.cn.sched.legopic2.tdnsv6.com 203.205.136.243, 443, 49789, 49790 TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCN China 13->42 44 18 other IPs or domains 13->44
Threat name:
Win32.Trojan.Strictor
Status:
Malicious
First seen:
2022-10-13 11:55:21 UTC
File Type:
PE (Exe)
Extracted files:
7
AV detection:
23 of 41 (56.10%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
aspackv2
Behaviour
Modifies Internet Explorer settings
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Loads dropped DLL
ASPack v2.12-2.42
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
0216a0f6d6d5360ab487e696b26a39eb81a1e2c8cd7f59c054c90ab99a858daf
MD5 hash:
d2a9c02acb735872261d2abc6aff7e45
SHA1 hash:
fce6c2cf2465856168ea55ccd806155199a6f181
SH256 hash:
fd672602ed6371ee5ec7d4d1c0311c4326ff075316c91dd628b075b046fae682
MD5 hash:
1a4d03ebc83a1fc3150c4bc9fd597b45
SHA1 hash:
dd7b3aead6f38ebfa3a3439b39beab3de1d0513b
SH256 hash:
c77a0f67c3392dee0fb04f0544d8fd8a3b6ef072d371303afd3a2c468dda7a35
MD5 hash:
142aeebfe85bde2a411116e39d8fd505
SHA1 hash:
d42b401d32a7141e592096bb68b6e029a1b13eae
SH256 hash:
2e9769ace867c79d5fcdda0eb2660c52b5e062c69b36add42d22eb0dddc4b3ee
MD5 hash:
f9a994df4d407bc79f7c84886fe7a654
SHA1 hash:
c93e4be70794164b7b339218cc832ac94074d08e
SH256 hash:
d1a1c6bac6a498adccdafab9d600a372aa9d5b826a33cfa06aaa9f75357c5b23
MD5 hash:
8f385e7c8cf1f8ebdae0448473977cc7
SHA1 hash:
942bf465e29a5e5f85580eb30aa9510b92f802d7
SH256 hash:
53483523c316ad8c022c2b07a5cabfff3339bc5cb5e4ac24c3260eea4f4d9731
MD5 hash:
7c1ff88991f5eafab82b1beaefc33a42
SHA1 hash:
5ea338434c4c070aaf4e4e3952b4b08b551267bc
SH256 hash:
1b28d05c306b575319c6fb9b08276b2204a7b569d9e540879ce67c8d17640990
MD5 hash:
f6a2a92194fc69858ffa9aa1557454da
SHA1 hash:
47dbb9abb4d83e2d21c6107c11244f8daae0cc5d
SH256 hash:
590c9ba4cad5a401c071f89f8468c45031a637f1c137ca320d9dbe82e4beabd6
MD5 hash:
2b86ad8cd1903916ae5a3cd7ec2f1b9e
SHA1 hash:
0240b4f0795ed3bf24748954fee6751901f26f2c
SH256 hash:
dd1d3049179c3eb79bebe1f56be2dd36fbab81b8c0c2d9b31ec1e29b14a0f6dc
MD5 hash:
1a0bd355a945a23fb2b971d774bc6f9d
SHA1 hash:
2d9ce4b378e40d0cd181eea65c4a0b6952eb00ee
SH256 hash:
149741274dbc5dc82d83766d39bcfb918f8ac5757e0002b1ab5c56f6e6648074
MD5 hash:
d6b67604eac1db8a24648aeb39a5b55b
SHA1 hash:
9a13c3250ac9f5237635d8b5929cfb1abf818897
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:SUSP_XORed_URL_in_EXE
Author:Florian Roth
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834
Rule name:SUSP_XORed_URL_in_EXE_RID2E46
Author:Florian Roth
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 149741274dbc5dc82d83766d39bcfb918f8ac5757e0002b1ab5c56f6e6648074

(this sample)

  
Delivery method
Distributed via web download

Comments