MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 19668327394d8d4ec3344736d51fd3ab1baf84b6982c549fe85772633116a1d1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 4 File information Comments

SHA256 hash: 19668327394d8d4ec3344736d51fd3ab1baf84b6982c549fe85772633116a1d1
SHA3-384 hash: 3a741d7b84bd93e61a9e349db20e1e4e760eb93bb3ec3996b76437e6c1bd3db839fc00624f85a9794ed822230c5b8668
SHA1 hash: 1e21de8b3d5bedd165450804362b85477f80507a
MD5 hash: 8526514cfa28b6608f389a2fe6e66def
humanhash: juliet-don-wolfram-wolfram
File name:SecuriteInfo.com.Win32.Malware-gen.4173.19795
Download: download sample
File size:3'137'000 bytes
First seen:2024-01-20 13:29:22 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5a594319a0d69dbc452e748bcf05892e (21 x ParallaxRAT, 20 x Gh0stRAT, 15 x NetSupport)
ssdeep 49152:vqe3f6dW4Jjcp6eGaI9J8yl4f8gh38ut3mEpPrk8yqzZdXXAk3DM:SSidtjJNaXRbpPrkBYdnxzM
TLSH T145E5F13BF268A13EC46A1B3245B393509877BB65A81A8C1F17FC390DCF765600E3B656
TrID 39.3% (.EXE) Inno Setup installer (107240/4/30)
21.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
15.7% (.EXE) InstallShield setup (43053/19/16)
15.2% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
3.8% (.EXE) Win64 Executable (generic) (10523/12/4)
File icon (PE):PE icon
dhash icon 5050d270cccc82ae (109 x Adware.Generic, 43 x LummaStealer, 42 x OffLoader)
Reporter SecuriteInfoCom
Tags:exe signed

Code Signing Certificate

Organisation:Symen Technologies LTD
Issuer:Sectigo Public Code Signing CA EV R36
Algorithm:sha256WithRSAEncryption
Valid from:2023-05-11T00:00:00Z
Valid to:2024-05-10T23:59:59Z
Serial number: 7fcb7834b69936c50d7e6b9a9c488f02
Thumbprint Algorithm:SHA256
Thumbprint: 8529cd43f0dffcf77c01c56463b10649d790791e461904803fe2593f0ef9f098
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
278
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
Sending a custom TCP request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
fingerprint installer lolbin overlay packed setupapi shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
46 / 100
Signature
.NET source code contains potential unpacker
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Found stalling execution ending in API Sleep call
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Snort IDS alert for network traffic
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1377976 Sample: SecuriteInfo.com.Win32.Malw... Startdate: 20/01/2024 Architecture: WINDOWS Score: 46 59 forum.enativ.com 2->59 61 api.enativ.com 2->61 75 Snort IDS alert for network traffic 2->75 77 Multi AV Scanner detection for submitted file 2->77 79 .NET source code contains potential unpacker 2->79 81 Binary is likely a compiled AutoIt script file 2->81 10 SecuriteInfo.com.Win32.Malware-gen.4173.19795.exe 2 2->10         started        signatures3 process4 file5 45 SecuriteInfo.com.W...-gen.4173.19795.tmp, PE32 10->45 dropped 13 SecuriteInfo.com.Win32.Malware-gen.4173.19795.tmp 3 15 10->13         started        process6 file7 47 C:\Users\user\AppData\...\validationuser.exe, PE32 13->47 dropped 49 C:\Users\user\AppData\Local\Temp\...\ruc.exe, PE32 13->49 dropped 51 C:\Users\user\AppData\Local\...\isxdl.dll, PE32 13->51 dropped 53 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 13->53 dropped 83 Binary is likely a compiled AutoIt script file 13->83 17 validationuser.exe 12 13->17         started        21 ruc.exe 1 13->21         started        signatures8 process9 dnsIp10 55 api.enativ.com 34.234.137.175, 443, 49714 AMAZON-AESUS United States 17->55 63 Multi AV Scanner detection for dropped file 17->63 65 Binary is likely a compiled AutoIt script file 17->65 67 Machine Learning detection for dropped file 17->67 73 2 other signatures 17->73 23 sc.exe 1 17->23         started        25 sc.exe 1 17->25         started        27 sc.exe 1 17->27         started        29 10 other processes 17->29 57 forum.enativ.com 163.172.170.31, 443, 49710, 49711 OnlineSASFR United Kingdom 21->57 69 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 21->69 71 Queries memory information (via WMI often done to detect virtual machines) 21->71 signatures11 process12 process13 31 conhost.exe 23->31         started        33 conhost.exe 25->33         started        35 conhost.exe 27->35         started        37 conhost.exe 29->37         started        39 conhost.exe 29->39         started        41 conhost.exe 29->41         started        43 7 other processes 29->43
Verdict:
unknown
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
NTFS ADS
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Launches sc.exe
AutoIT Executable
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Unpacked files
SH256 hash:
eaad1375329319d1fc24129f2179ce61e5cd6108f52d2e3066d9257ecec92a11
MD5 hash:
c25a6db07ec34f8f9233b4c1af57ac57
SHA1 hash:
f59a6600b12d01ad5e33bc732d0107b5755d8981
Detections:
AutoIT_Compiled
SH256 hash:
39c4e3f4a7e133a6c0eeae8cd3ae7691cda63ada51df9f683084e708b7b3db46
MD5 hash:
932d541736cd4f4bca955b5b9ef4b208
SHA1 hash:
bf92122c3dff5b06c44f2ef0f34c32ce48327b4c
Detections:
AutoIT_Compiled
SH256 hash:
80971307c9a28b179c8290a29f8cb042710ac8e519e59a35334f22ea0b7edd62
MD5 hash:
ba3dfacd7eec21cb479e78709854c0a5
SHA1 hash:
71b65a7d7154fc1fa2d2217333b3054d1c5afde9
SH256 hash:
ac6d139cf6ed554b54ee638a81775c0ca77b86583a74e501712276980a580099
MD5 hash:
8633615f1f3bcbdce8f3e1099bb01993
SHA1 hash:
43d2436884afd5637082b959e65164f549e49bd0
SH256 hash:
2dfbe7dc5d9d4d9375c6f0695ea95bfe5f0ab17097d28fee5412d7429b6f99bc
MD5 hash:
2b656b8d89a7213ab9f9eb7e9024b3a1
SHA1 hash:
26bc5417dc23324a33fac57e6712c9e843ab7a50
SH256 hash:
19668327394d8d4ec3344736d51fd3ab1baf84b6982c549fe85772633116a1d1
MD5 hash:
8526514cfa28b6608f389a2fe6e66def
SHA1 hash:
1e21de8b3d5bedd165450804362b85477f80507a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments