MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 18446dd20730083ac5221b04910933f02274c93f0b676159f1d550c4879f3c33. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stop
Vendor detections: 18
| SHA256 hash: | 18446dd20730083ac5221b04910933f02274c93f0b676159f1d550c4879f3c33 |
|---|---|
| SHA3-384 hash: | b87e1c0ca8941b605516eae54b2a4a4285b2e127ce5a24c31979f375d8a784eceff9da1ebbf10d82ea956f6a60c5e4d3 |
| SHA1 hash: | 7fddb0ea73306c67fba2c91b71c9de6df0904692 |
| MD5 hash: | 9d6ff2888873db3abeb35ce55ab7f159 |
| humanhash: | undress-oklahoma-white-oregon |
| File name: | 1.bin |
| Download: | download sample |
| Signature | Stop |
| File size: | 801'792 bytes |
| First seen: | 2023-03-15 04:19:14 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 0e44420b9a05a744c486eb2348abf4b5 (4 x RedLineStealer, 1 x LaplasClipper, 1 x Smoke Loader) |
| ssdeep | 12288:Y09KMGLe0UNhqTimz5gEQZ8N1KDvLRKT0N6mlpKmSXZArdGyA:u9LdQ+imz351kTYQgmRd9A |
| Threatray | 1'351 similar samples on MalwareBazaar |
| TLSH | T16E050202A2E1FC53D9664A318D2DC2FC792EB8518E5D7B6AB214AF5F19730B2D273701 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 011edec884a49880 (1 x Stop) |
| Reporter | |
| Tags: | Stop |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
https://t.me/zaskullz
https://steamcommunity.com/profiles/76561199486572327
http://135.181.87.234:80
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | BitcoinAddress |
|---|---|
| Author: | Didier Stevens (@DidierStevens) |
| Description: | Contains a valid Bitcoin address |
| Rule name: | has_telegram_urls |
|---|---|
| Author: | Aaron DeVera<aaron@backchannel.re> |
| Description: | Detects Telegram URLs |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Windows executables referencing non-Windows User-Agents |
| Rule name: | MALWARE_Win_STOP |
|---|---|
| Author: | ditekSHen |
| Description: | Detects STOP ransomware |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | SUSP_XORed_URL_in_EXE |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | SUSP_XORed_URL_in_EXE_RID2E46 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | Telegram_Links |
|---|
| Rule name: | Windows_Ransomware_Stop_1e8d48ff |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_stop_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.stop. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.