MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 149c80ebeeead2dff7b45f8a627d5396b995f6afc82f18487d7c6eb4bf071205. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkComet


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: 149c80ebeeead2dff7b45f8a627d5396b995f6afc82f18487d7c6eb4bf071205
SHA3-384 hash: 4aa927ecbe29ecf7536dd381528497aa269eaba09ebe76f552a65cc4aac1dd82b2c4f8a3b51030124de9f4db79aef01a
SHA1 hash: 6a07c7d735d57852f0876bfaf133f570b0975424
MD5 hash: 5e90d591b55d2b8479bc4de27178f082
humanhash: vegan-four-seven-lactose
File name:hareketleriniz pdf.exe
Download: download sample
Signature DarkComet
File size:1'427'968 bytes
First seen:2023-04-28 04:29:50 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:CuYPXb0GsXJSi7M3waJ0Gi9oKi3rkE5A918cT+SYPbu:CuYHAJSi7bC/QFE5yKcSSY
Threatray 548 similar samples on MalwareBazaar
TLSH T1DE659C3C19BDE22BD1B8C6A58FD18427F390946B3115EEE5ACD34791832AE5235C723E
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:DarkComet exe geo RAT TUR

Intelligence


File Origin
# of uploads :
1
# of downloads :
335
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
hareketleriniz pdf.exe
Verdict:
Malicious activity
Analysis date:
2023-04-28 04:40:14 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
Creating a process with a hidden window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Snake Keylogger
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Drops PE files to the document folder of the user
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 855552 Sample: hareketleriniz_pdf.exe Startdate: 28/04/2023 Architecture: WINDOWS Score: 100 98 checkip.dyndns.org 2->98 100 checkip.dyndns.com 2->100 122 Snort IDS alert for network traffic 2->122 124 Found malware configuration 2->124 126 Malicious sample detected (through community Yara rule) 2->126 128 12 other signatures 2->128 10 hareketleriniz_pdf.exe 7 2->10         started        14 Synaptics.exe 2->14         started        16 pxypFp.exe 5 2->16         started        18 EXCEL.EXE 2->18         started        signatures3 process4 dnsIp5 90 C:\Users\user\AppData\Roaming\pxypFp.exe, PE32 10->90 dropped 92 C:\Users\user\...\pxypFp.exe:Zone.Identifier, ASCII 10->92 dropped 94 C:\Users\user\AppData\Local\...\tmp27CF.tmp, XML 10->94 dropped 96 C:\Users\user\...\hareketleriniz_pdf.exe.log, ASCII 10->96 dropped 148 Uses schtasks.exe or at.exe to add and modify task schedules 10->148 150 Adds a directory exclusion to Windows Defender 10->150 21 hareketleriniz_pdf.exe 1 5 10->21         started        24 powershell.exe 20 10->24         started        26 schtasks.exe 1 10->26         started        28 Synaptics.exe 14->28         started        30 schtasks.exe 14->30         started        152 Multi AV Scanner detection for dropped file 16->152 154 Machine Learning detection for dropped file 16->154 156 Injects a PE file into a foreign processes 16->156 32 pxypFp.exe 16->32         started        34 schtasks.exe 16->34         started        102 192.168.2.1 unknown unknown 18->102 file6 signatures7 process8 file9 72 C:\Users\...\._cache_hareketleriniz_pdf.exe, Unknown 21->72 dropped 74 C:\...\Synaptics.exe:Zone.Identifier, Unknown 21->74 dropped 76 C:\ProgramData\Synaptics\Synaptics.exe, Unknown 21->76 dropped 36 Synaptics.exe 21->36         started        39 ._cache_hareketleriniz_pdf.exe 15 2 21->39         started        42 conhost.exe 24->42         started        44 conhost.exe 26->44         started        78 C:\ProgramData\...\._cache_Synaptics.exe, PE32 28->78 dropped 46 ._cache_Synaptics.exe 28->46         started        48 conhost.exe 30->48         started        80 C:\Users\user\AppData\...\._cache_pxypFp.exe, PE32 32->80 dropped 50 conhost.exe 34->50         started        process10 dnsIp11 130 Drops PE files to the document folder of the user 36->130 132 Machine Learning detection for dropped file 36->132 134 Adds a directory exclusion to Windows Defender 36->134 136 Injects a PE file into a foreign processes 36->136 52 Synaptics.exe 36->52         started        56 powershell.exe 36->56         started        58 schtasks.exe 36->58         started        110 checkip.dyndns.com 158.101.44.242, 49697, 49713, 80 ORACLE-BMC-31898US United States 39->110 112 checkip.dyndns.org 39->112 138 Tries to steal Mail credentials (via file / registry access) 39->138 114 checkip.dyndns.org 46->114 140 Antivirus detection for dropped file 46->140 142 Multi AV Scanner detection for dropped file 46->142 144 May check the online IP address of the machine 46->144 146 2 other signatures 46->146 signatures12 process13 dnsIp14 104 freedns.afraid.org 174.128.246.100, 49705, 80 ST-BGPUS United States 52->104 106 docs.google.com 172.217.168.14, 443, 49700, 49701 GOOGLEUS United States 52->106 108 xred.mooo.com 52->108 82 C:\Users\user\Downloads\ChromeSetup.exe, PE32 52->82 dropped 84 C:\Users\user\Documents\BXAJUJAOEO\~$cache1, PE32 52->84 dropped 86 C:\Users\user\Desktop\._cache_Synaptics.exe, PE32 52->86 dropped 88 8 other malicious files 52->88 dropped 60 ._cache_Synaptics.exe 52->60         started        64 WerFault.exe 52->64         started        66 WerFault.exe 52->66         started        68 conhost.exe 56->68         started        70 conhost.exe 58->70         started        file15 process16 dnsIp17 116 193.122.130.0, 49698, 49718, 80 ORACLE-BMC-31898US United States 60->116 118 checkip.dyndns.org 60->118 120 checkip.dyndns.com 60->120 158 Antivirus detection for dropped file 60->158 160 Multi AV Scanner detection for dropped file 60->160 162 May check the online IP address of the machine 60->162 164 2 other signatures 60->164 signatures18
Threat name:
Win32.Trojan.Pwsx
Status:
Malicious
First seen:
2023-04-28 04:55:13 UTC
File Type:
PE (.Net Exe)
Extracted files:
5
AV detection:
12 of 22 (54.55%)
Threat level:
  5/5
Result
Malware family:
snakekeylogger
Score:
  10/10
Tags:
family:snakekeylogger collection keylogger persistence spyware stealer
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Enumerates system info in registry
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Snake Keylogger
Snake Keylogger payload
Malware Config
C2 Extraction:
https://api.telegram.org/bot6241220793:AAFx6XFOw5z4Op7twC8hAqYib_mTz67Z4Ak/sendMessage?chat_id=2054148913
Unpacked files
SH256 hash:
b9eae90f8e942cc4586d31dc484f29079651ad64c49f90d99f86932630c66af2
MD5 hash:
c0ef4d6237d106bf51c8884d57953f92
SHA1 hash:
f1da7ecbbee32878c19e53c7528c8a7a775418eb
SH256 hash:
4f876cba97abe4d88f3605fc5baad5409fdbe0bc0b762b31113d7ad02054920e
MD5 hash:
0d5d4cd0a6998b7d3346626cf4be40b2
SHA1 hash:
eff5a9a7567e50b5022e105e76c6f8bea1723a0c
SH256 hash:
58d2780bac07a53fa9ef0099c386ad23c2c5b83df99e18bbcca9895f829ef5d8
MD5 hash:
3a6ac846fbf56df68c3cb61cd18c7623
SHA1 hash:
e5b7f4e47b357f330b33330663ff5739a02d442f
SH256 hash:
106a0f51be0ca574906ff9195f3ba974809912e3c4c785108ac884128669185d
MD5 hash:
00092d40a1b91d357b13ce7320523d8c
SHA1 hash:
a2470120f9cbaa2d5bc282e2254a2285d7ccbfcd
SH256 hash:
40c050c20d957d26b932faf690f9c2933a194aa6607220103ec798f46ac03403
MD5 hash:
c768bac25fc6f0551a11310e7caba8d5
SHA1 hash:
95f9195e959fb48277c95d1dd1c97a4edff7cb3a
SH256 hash:
149c80ebeeead2dff7b45f8a627d5396b995f6afc82f18487d7c6eb4bf071205
MD5 hash:
5e90d591b55d2b8479bc4de27178f082
SHA1 hash:
6a07c7d735d57852f0876bfaf133f570b0975424
Malware family:
SnakeKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

DarkComet

Executable exe 149c80ebeeead2dff7b45f8a627d5396b995f6afc82f18487d7c6eb4bf071205

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments