MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 163db4da78af3020f61a1d98aa27be9377038f4d254bfe84f19ce9c324c849fe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkCloud


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: 163db4da78af3020f61a1d98aa27be9377038f4d254bfe84f19ce9c324c849fe
SHA3-384 hash: 03159e2a3471b450df4c6aed311e8fae936efd1d826392d8ec67bb124175b25c650edfb47eb26c7f8731015cc87ac28d
SHA1 hash: 960f4d4ed10649b8b0d88515acce1ea995db25df
MD5 hash: c9d3689f31c46cd9c3efe03b616fe443
humanhash: mango-sixteen-ohio-burger
File name:Invoice_56789947PDF.exe
Download: download sample
Signature DarkCloud
File size:1'299'525 bytes
First seen:2023-03-15 22:55:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 12e12319f1029ec4f8fcbed7e82df162 (389 x DCRat, 52 x RedLineStealer, 51 x Formbook)
ssdeep 24576:NTbBv5rUanbsUt26V/0HYYEBpFvvtFgR1VwCLmtmH6opxUPPvfjPLKLZ4aw+6vFJ:HBjbsC0HKpvsR1VVStmHXxUPvje5Uc6
Threatray 471 similar samples on MalwareBazaar
TLSH T153551202BDC298B2C4A31D725A356B11ED7CB9201BB0DDEF67945A1EDA319C0D731BB2
TrID 89.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.5% (.EXE) Win64 Executable (generic) (10523/12/4)
2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 74f4d4d4cce4e8e0 (27 x AgentTesla, 19 x Formbook, 17 x DBatLoader)
Reporter James_inthe_box
Tags:DarkCloud exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
247
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Invoice_56789947PDF.exe
Verdict:
Malicious activity
Analysis date:
2023-03-15 22:57:52 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Enabling the 'hidden' option for files in the %temp% directory
Launching a process
Creating a process from a recently created file
Creating a file
Sending a custom TCP request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm anti-vm autoit greyware keylogger overlay packed setupapi.dll shdocvw.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Drops PE files with a suspicious file extension
Found many strings related to Crypto-Wallets (likely being stolen)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Starts an encoded Visual Basic Script (VBE)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected AntiVM autoit script
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 827522 Sample: Invoice_56789947PDF.exe Startdate: 15/03/2023 Architecture: WINDOWS Score: 100 60 Malicious sample detected (through community Yara rule) 2->60 62 Multi AV Scanner detection for submitted file 2->62 64 Yara detected AntiVM autoit script 2->64 66 4 other signatures 2->66 8 Invoice_56789947PDF.exe 72 2->8         started        12 sbnu.pif 2->12         started        14 sbnu.pif 1 2->14         started        16 sbnu.pif 2->16         started        process3 file4 46 C:\Users\user\AppData\Local\Temp\...\sbnu.pif, PE32 8->46 dropped 74 Drops PE files with a suspicious file extension 8->74 76 Starts an encoded Visual Basic Script (VBE) 8->76 18 wscript.exe 1 8->18         started        78 Writes to foreign memory regions 12->78 80 Allocates memory in foreign processes 12->80 82 Injects a PE file into a foreign processes 12->82 20 RegSvcs.exe 12->20         started        22 RegSvcs.exe 12->22         started        24 RegSvcs.exe 14->24         started        26 RegSvcs.exe 14->26         started        28 RegSvcs.exe 16->28         started        30 RegSvcs.exe 16->30         started        signatures5 process6 process7 32 sbnu.pif 1 3 18->32         started        36 WerFault.exe 20->36         started        file8 44 C:\Users\user\AppData\Local\...\RegSvcs.exe, PE32 32->44 dropped 52 Multi AV Scanner detection for dropped file 32->52 54 Contains functionality to inject code into remote processes 32->54 56 Writes to foreign memory regions 32->56 58 2 other signatures 32->58 38 RegSvcs.exe 32->38         started        41 RegSvcs.exe 1 49 32->41         started        signatures9 process10 dnsIp11 68 May check the online IP address of the machine 38->68 70 Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes) 38->70 48 api.telegram.org 149.154.167.220, 443, 49696, 49697 TELEGRAMRU United Kingdom 41->48 50 showip.net 162.55.60.2, 49695, 80 ACPCA United States 41->50 72 Tries to harvest and steal browser information (history, passwords, etc) 41->72 signatures12
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2023-03-14 09:24:12 UTC
File Type:
PE (Exe)
Extracted files:
117
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
persistence
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Unpacked files
SH256 hash:
3b75425895af4ae3186b36277553641e37ca1d620ae18d68e40d13351b54de6a
MD5 hash:
94d1531b52774dce52a89e33646d5b1d
SHA1 hash:
29bf887b025b97bd7a9e1e261852ba824234a625
SH256 hash:
84b80c2f6733385a097b651e9fd29e1b4790f07c6051abc49b1e9c84bbd56f85
MD5 hash:
f9f1485bb74a20a175c40d74ebbc9e8d
SHA1 hash:
b0f003488da34010e7fd1bbd125eff39601cc0b3
SH256 hash:
0f30556578a9ddb44198b992f85386efc93e012307fecd71749f54ac903d1d9c
MD5 hash:
036b8e66dd0b064041fe8b9de022a979
SHA1 hash:
01d498e92349d4d1a83413fbb58cb19f8f5059de
SH256 hash:
163db4da78af3020f61a1d98aa27be9377038f4d254bfe84f19ce9c324c849fe
MD5 hash:
c9d3689f31c46cd9c3efe03b616fe443
SHA1 hash:
960f4d4ed10649b8b0d88515acce1ea995db25df
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:sfx_pdb
Author:@razvialex
Description:Detect interesting files containing sfx with pdb paths.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments