MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 182d5eaca9805eff8657a5146f7127f797644d91c5f0f4b1343e86018c6eb7a2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 3 File information Comments

SHA256 hash: 182d5eaca9805eff8657a5146f7127f797644d91c5f0f4b1343e86018c6eb7a2
SHA3-384 hash: 204757d5c662e8bf8f6487fb9bf4ec865da986f5ba67ecdc44153a069eaeb1c913b864117c7f40692721c083c8a69966
SHA1 hash: e7fec105450027577b93291088c23885ad6f5c7d
MD5 hash: ac083daa6c00b5c2814fecb63238eb14
humanhash: freddie-pennsylvania-hotel-lion
File name:SecuriteInfo.com.FileRepPup.31775.31318
Download: download sample
File size:891'512 bytes
First seen:2024-04-30 14:32:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b34f154ec913d2d2c435cbd644e91687 (533 x GuLoader, 110 x RemcosRAT, 80 x EpsilonStealer)
ssdeep 24576:uSXjjzc2MMDu173CTPG1szLSvJwW/k9Gt4Ym:DEMK73C7fqvCpGtpm
TLSH T10115125E8FA4CC4AD883C5B0EE392D9A8F237C3A11797312BB7AF11585FB9819736051
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
File icon (PE):PE icon
dhash icon 9831654d4d653198
Reporter SecuriteInfoCom
Tags:exe signed

Code Signing Certificate

Organisation:ITPRODUCTDEV LTD
Issuer:GlobalSign Extended Validation CodeSigning CA - SHA256 - G3
Algorithm:sha256WithRSAEncryption
Valid from:2020-05-18T10:45:28Z
Valid to:2023-05-19T10:45:28Z
Serial number: 1355660840b5813ad3d93017
Intelligence: 4 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: e6847c414cd9e374b8fccc822d9c72e210f9d691075c11cce72f4a2b84c02028
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
335
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
182d5eaca9805eff8657a5146f7127f797644d91c5f0f4b1343e86018c6eb7a2.exe
Verdict:
Malicious activity
Analysis date:
2024-04-30 14:38:13 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Creating a window
Searching for the window
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
lolbin overlay packed shell32
Verdict:
Suspicious
Labled as:
Win32_ITProductDev_A_potentially_unwanted
Result
Threat name:
n/a
Detection:
suspicious
Classification:
evad
Score:
24 / 100
Signature
Installs new ROOT certificates
Uses cmd line tools excessively to alter registry or file data
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1434171 Sample: SecuriteInfo.com.FileRepPup... Startdate: 30/04/2024 Architecture: WINDOWS Score: 24 91 Uses cmd line tools excessively to alter registry or file data 2->91 7 SecuriteInfo.com.FileRepPup.31775.31318.exe 38 152 2->7         started        11 Televzr Light.exe 2->11         started        14 msiexec.exe 373 69 2->14         started        process3 dnsIp4 75 216.239.34.178 GOOGLEUS United States 7->75 77 104.21.63.211 CLOUDFLARENETUS United States 7->77 81 2 other IPs or domains 7->81 59 C:\Users\user\AppData\...\Televzr Light.exe, PE32 7->59 dropped 61 C:\Users\user\AppData\Local\...\vulkan-1.dll, PE32 7->61 dropped 63 C:\Users\user\AppData\...\vk_swiftshader.dll, PE32 7->63 dropped 71 20 other files (none is malicious) 7->71 dropped 16 vcredist_x86.exe 78 7->16         started        19 cmd.exe 1 7->19         started        21 cmd.exe 1 7->21         started        79 44.237.30.204 AMAZON-02US United States 11->79 93 Uses cmd line tools excessively to alter registry or file data 11->93 23 reg.exe 11->23         started        25 reg.exe 11->25         started        27 reg.exe 11->27         started        29 17 other processes 11->29 65 C:\Windows\SysWOW64\vcomp100.dll, PE32 14->65 dropped 67 C:\Windows\SysWOW64\mfcm100u.dll, PE32 14->67 dropped 69 C:\Windows\SysWOW64\mfcm100.dll, PE32 14->69 dropped 73 32 other files (none is malicious) 14->73 dropped file5 signatures6 process7 dnsIp8 51 C:\...\sqmapi.dll, PE32 16->51 dropped 53 C:\...\Setupuser.dll, PE32 16->53 dropped 55 C:\...\SetupUi.dll, PE32 16->55 dropped 57 11 other files (none is malicious) 16->57 dropped 32 Setup.exe 2 9 16->32         started        35 conhost.exe 19->35         started        47 2 other processes 19->47 37 conhost.exe 21->37         started        39 more.com 1 21->39         started        41 conhost.exe 23->41         started        43 conhost.exe 25->43         started        45 conhost.exe 27->45         started        83 172.217.2.46 GOOGLEUS United States 29->83 85 104.26.9.158 CLOUDFLARENETUS United States 29->85 87 172.67.150.95 CLOUDFLARENETUS United States 29->87 49 11 other processes 29->49 file9 process10 signatures11 89 Installs new ROOT certificates 32->89
Verdict:
unknown
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Loads dropped DLL
Unpacked files
SH256 hash:
9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
MD5 hash:
1cc7c37b7e0c8cd8bf04b6cc283e1e56
SHA1 hash:
0b9519763be6625bd5abce175dcc59c96d100d4c
SH256 hash:
b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
MD5 hash:
80e44ce4895304c6a3a831310fbf8cd0
SHA1 hash:
36bd49ae21c460be5753a904b4501f1abca53508
SH256 hash:
5d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962
MD5 hash:
ec0504e6b8a11d5aad43b296beeb84b2
SHA1 hash:
91b5ce085130c8c7194d66b2439ec9e1c206497c
SH256 hash:
3f47a24d6eeb1203e3325f0b06023e9678df7e860e953925057de17e6c539be4
MD5 hash:
fd78a68cb7e9fa26dec0d9d1b2342c72
SHA1 hash:
06d39a9eadc6d4272a5ae2f2ce632de5628d375b
SH256 hash:
4001b4a5d9993964f00575fead88f8adad15c5f9759c11fcd9e8e9173f21ccb4
MD5 hash:
4b227babe5af8eb2762b97b9ff961cb4
SHA1 hash:
ceaca504b88c8044d7a966be168748fd2584ca71
SH256 hash:
54a5b5f4d00625e9be0c0e05c378d5e8cdb1d767269e4adcaa0869d878f30926
MD5 hash:
1e24d3e2694d096445d75296a42fd79f
SHA1 hash:
1add6de86488d162d520da27e26210b1dd6aa227
SH256 hash:
1aadf9c9e58c9a0b62ec55753577db5315c1e55d057449409421ec75a1fd4986
MD5 hash:
7af5765f9b4c26d9253978c247484c76
SHA1 hash:
076a2b7413ae044ff998392f108bc49570488cc0
SH256 hash:
369e52e14f1a6d43abee6ed0f6f011dbadfe8be16764a7e1ba7913054616a244
MD5 hash:
f5c231fc34d9f3407fd43d9286d7244e
SHA1 hash:
04a92b3a625bd7a004a07b3f17ee79eec45dce3c
SH256 hash:
182d5eaca9805eff8657a5146f7127f797644d91c5f0f4b1343e86018c6eb7a2
MD5 hash:
ac083daa6c00b5c2814fecb63238eb14
SHA1 hash:
e7fec105450027577b93291088c23885ad6f5c7d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NSIS_April_2024
Author:NDA0N
Description:Detects NSIS installers
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::SetFileSecurityW
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteExW
SHELL32.dll::SHFileOperationW
SHELL32.dll::SHGetFileInfoW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
ADVAPI32.dll::OpenProcessToken
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetDiskFreeSpaceW
KERNEL32.dll::GetCommandLineW
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileW
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileExW
KERNEL32.dll::MoveFileW
WIN_BASE_USER_APIRetrieves Account InformationADVAPI32.dll::LookupPrivilegeValueW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::AppendMenuW
USER32.dll::EmptyClipboard
USER32.dll::FindWindowExW
USER32.dll::OpenClipboard
USER32.dll::PeekMessageW
USER32.dll::CreateWindowExW

Comments