MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 17291fc45dc342a6ce4309dd4b77cd094c564fad14c212bca827770daf7207d4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 17291fc45dc342a6ce4309dd4b77cd094c564fad14c212bca827770daf7207d4
SHA3-384 hash: 02c74abd6baffb644f971ea433d7b8c9c640a42dd2b3018c09e46f1f59c31c7f4e2534673856fcfac34d28ff40304a35
SHA1 hash: a03795d657634144187b24971ecbb9e794131eee
MD5 hash: a4e28afc3642a837ca14fcf6719cf97e
humanhash: november-october-magnesium-xray
File name:HVNC.dll
Download: download sample
File size:94'720 bytes
First seen:2023-04-10 06:04:30 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 2be9fd94ed3a0f609abd1ef60299ee92
ssdeep 1536:kS0ZG4UMpzNFj5OKAWmlrYZRJmnPeUsgqzbLMsNOxBznt:kSAbAKAWmqYnPeUstzDMxBzn
Threatray 6 similar samples on MalwareBazaar
TLSH T11A938C15B65192FEF4F6503824EFBB72827A732497680CD3DE9B3E4458026D27B3634A
TrID 45.9% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.4% (.EXE) Win64 Executable (generic) (10523/12/4)
9.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.6% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter lazydaemon
Tags:dll hvnc TA505

Intelligence


File Origin
# of uploads :
1
# of downloads :
271
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
formbook lokibot shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw.evad
Score:
64 / 100
Signature
Contains functionality to modify clipboard data
Found evasive API chain (may stop execution after checking computer name)
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 843928 Sample: HVNC.dll Startdate: 10/04/2023 Architecture: WINDOWS Score: 64 23 Multi AV Scanner detection for submitted file 2->23 7 loaddll32.exe 1 2->7         started        process3 process4 9 rundll32.exe 1 7->9         started        13 rundll32.exe 7->13         started        15 cmd.exe 1 7->15         started        17 conhost.exe 7->17         started        dnsIp5 21 64.52.80.210, 443, 49697, 49698 WINDSTREAMUS United States 9->21 25 Found evasive API chain (may stop execution after checking computer name) 9->25 27 Contains functionality to modify clipboard data 9->27 29 System process connects to network (likely due to code injection or exploit) 13->29 19 rundll32.exe 15->19         started        signatures6 process7
Threat name:
Win32.Trojan.Lazy
Status:
Malicious
First seen:
2023-04-10 06:05:07 UTC
File Type:
PE (Dll)
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Reads user/profile data of web browsers
Blocklisted process makes network request
Unpacked files
SH256 hash:
17291fc45dc342a6ce4309dd4b77cd094c564fad14c212bca827770daf7207d4
MD5 hash:
a4e28afc3642a837ca14fcf6719cf97e
SHA1 hash:
a03795d657634144187b24971ecbb9e794131eee
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments