MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1876cd258f4c302d469e3f8353f644eeb8ae37fee08ca558472970fac48f69c9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stop
Vendor detections: 12
| SHA256 hash: | 1876cd258f4c302d469e3f8353f644eeb8ae37fee08ca558472970fac48f69c9 |
|---|---|
| SHA3-384 hash: | 702bfb108eaa22a2cab816a7b09555ac079429877b263a020d273a9c1b30bab01b6c811b9fa9dce19e5606cd38cf58a3 |
| SHA1 hash: | 6a3d50b4d1f3ffea4584ffee5f2b8d3722a6af33 |
| MD5 hash: | a97a5f5c8445910c489c1055c26c5147 |
| humanhash: | hamper-johnny-foxtrot-avocado |
| File name: | a97a5f5c8445910c489c1055c26c5147.exe |
| Download: | download sample |
| Signature | Stop |
| File size: | 822'272 bytes |
| First seen: | 2021-09-24 11:55:13 UTC |
| Last seen: | 2021-09-24 13:21:31 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | efb815d76c298dec768e3e4b14d60fd3 (10 x RedLineStealer, 2 x Stop, 1 x Smoke Loader) |
| ssdeep | 12288:t3PykfI1/SspiOX5Upoqj+ua91G0SF26y+EzidvbpT+TQ2T3ck:ffI1/DX5Gozf5SIr8xhH |
| Threatray | 720 similar samples on MalwareBazaar |
| TLSH | T12F050220B6E0C034F1B713F559B693B8BA2DBDB16B2485CB62D51AEE4574AE0CC31397 |
| File icon (PE): | |
| dhash icon | aad8ac9cc6a68ee0 (34 x RedLineStealer, 14 x RaccoonStealer, 11 x Smoke Loader) |
| Reporter | |
| Tags: | exe Stop |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://wrrst.top/fhsgtsspen6/get.php | https://threatfox.abuse.ch/ioc/225699/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
4c0a2d5ae790a8b42c2badf178034513ddb3ab2e0c12bc1706c9163a4b0564c2
51ec15e556be63f144a4a105d55432853b109f4595ec820f34cae748ab22de5c
a48d6103ec10de6c9ddfa5c1f3dce6eeb6ae7cb536d97b5ce74810073a3ea897
fa2b5ac0f97daca56acd1c528d6b092a9231d7cff3610d687d1f0f1fc02f242a
6ffe1a9f5f606a6bcd0b873743a7fb91f1b1e07fc709b371c6a83592ff7cf619
309e63e8352848615c6b2afe5b65516711e374265d24df5aeabfa6773bc46c16
1876cd258f4c302d469e3f8353f644eeb8ae37fee08ca558472970fac48f69c9
7d992557f91aed01868636656b536282273feea15fc95f3bf4a42f4b7443fa77
cdc23865fdb8dcc01cc7a43320b2960361d6d0d2eeba69f9093f3b9ac69daf91
f5928b4b67f399e11ece2de04588730b5891105ab72add45c7a9ff1fc3d961b7
3f4b6ad0ebd72f4cd135f72266a7fb9d2f11aa7081a7234b5fc5b24a1a765e41
e9a78c00f0c651f605119a584225f7ac87ef48eff719b6b4414931c88e7df7df
45e1d742b3e10f3dbcf28ff2e4a8ecd819869a2a60330b0990f15fbdd329729a
ef883b1302fd39664bf7ef489ddac6ae0a4e09be8f46d5c975a127174d0d9c34
2ad5958a9660a51f8daa1340e35491c608eb39b3ccc52d00744c50795122e81c
30fe1a0c497da6babc63705181d30f2912d7b28d987eb3b8a416d768a10095ce
fe9867448fb67fcadeb9f432d363b93e06ac3e3a7bc87e44a93f1f16746ea2e5
bcaca8a95189a898417c977c42e8160fe81c68ca603557e3c30b38be666b808b
27b8ae096f653dba866c0a890ccbbca702b7f9dbdb1f73cfd00fa7653e20b2a1
951e1365d62ceb2a6ae48f5391fdd4285de64c680effe8d1903279ba8d590f6b
84be61718ad6d74949916b9ac469f0e2f7786a510a2d7b3bbc7865a3e6ea50cf
2da6b8701261713c68a89d8ace48809627a80eaece6a3af179242a66a11dec3c
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing SQL queries to confidential data stores. Observed in infostealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing potential Windows Defender anti-emulation checks |
| Rule name: | MALWARE_Win_STOP |
|---|---|
| Author: | ditekSHen |
| Description: | Detects STOP ransomware |
| Rule name: | MALWARE_Win_Vidar |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Vidar / ArkeiStealer |
| Rule name: | SUSP_XORed_URL_in_EXE |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | SUSP_XORed_URL_in_EXE_RID2E46 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | Vidar |
|---|---|
| Author: | kevoreilly |
| Description: | Vidar Payload |
| Rule name: | win_stop_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.stop. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.