MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1a7075ca044dd3be84270c4e3a281e3708e5bd6e3499d6bf664160b73c0bd1a5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments 1

SHA256 hash: 1a7075ca044dd3be84270c4e3a281e3708e5bd6e3499d6bf664160b73c0bd1a5
SHA3-384 hash: cbce65e4d808e4802df957582e8fade6e7b1ee86e2d975433c9942977bdc1900fcf82d85188b0143d50c6d58a4599589
SHA1 hash: 6aecc99c90043fb9df40f38436c0886aee321121
MD5 hash: 497287b2c0270f7502b8797c72b36055
humanhash: washington-ten-wyoming-princess
File name:497287b2c0270f7502b8797c72b36055
Download: download sample
File size:1'254'160 bytes
First seen:2021-10-30 16:51:37 UTC
Last seen:2021-10-30 19:38:43 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d287b46f6436ae965f0f1af9da8d89c9 (1 x RedLineStealer, 1 x SectopRAT)
ssdeep 24576:yq8cMci8rk8yRqMkytzdzs1JSzQ+t9aWtAOBY1tapGgGKm/TmlG:ymMci8rNyUqzciBHtGaHuq
Threatray 8 similar samples on MalwareBazaar
TLSH T12145238963D295BFD0E2AB3185F6521B9F30BDE128B9632D33897DD64C63161AC70353
File icon (PE):PE icon
dhash icon d4d4d4aa55d4aa01
Reporter zbetcheckin
Tags:32 exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
208
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
497287b2c0270f7502b8797c72b36055
Verdict:
Malicious activity
Analysis date:
2021-10-30 16:56:32 UTC
Tags:
autoit trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% subdirectories
Creating a process with a hidden window
Running batch commands
Launching cmd.exe command interpreter
Launching a process
Searching for the window
Creating a file in the Windows subdirectories
Deleting a recently created file
Launching the process to create tasks for the scheduler
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.expl.evad
Score:
84 / 100
Signature
Creates processes via WMI
Drops PE files with a suspicious file extension
Multi AV Scanner detection for submitted file
Obfuscated command line found
Sigma detected: Drops script at startup location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Uses ping.exe to check the status of other devices and networks
Uses schtasks.exe or at.exe to add and modify task schedules
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 512285 Sample: zww9sm5ai5 Startdate: 30/10/2021 Architecture: WINDOWS Score: 84 51 eth0.me 2->51 61 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->61 63 Multi AV Scanner detection for submitted file 2->63 65 Sigma detected: Drops script at startup location 2->65 10 zww9sm5ai5.exe 1 5 2->10         started        13 wscript.exe 2->13         started        15 NwxMISeIez.exe.com 2->15         started        18 rundll32.exe 2->18         started        signatures3 process4 dnsIp5 73 Uses schtasks.exe or at.exe to add and modify task schedules 10->73 20 cmd.exe 1 10->20         started        23 at.exe 1 10->23         started        75 Creates processes via WMI 13->75 57 kWpbVmpiqDpFGIqXcLFhpO.kWpbVmpiqDpFGIqXcLFhpO 15->57 signatures6 process7 signatures8 67 Obfuscated command line found 20->67 69 Drops PE files with a suspicious file extension 20->69 71 Uses ping.exe to check the status of other devices and networks 20->71 25 cmd.exe 3 20->25         started        29 conhost.exe 20->29         started        31 conhost.exe 23->31         started        process9 file10 45 C:\Users\user\AppData\Local\...\Vidi.exe.com, PE32 25->45 dropped 77 Obfuscated command line found 25->77 33 Vidi.exe.com 25->33         started        36 PING.EXE 1 25->36         started        39 findstr.exe 1 25->39         started        signatures11 process12 dnsIp13 59 Drops PE files with a suspicious file extension 33->59 41 Vidi.exe.com 6 33->41         started        53 127.0.0.1 unknown unknown 36->53 signatures14 process15 dnsIp16 55 kWpbVmpiqDpFGIqXcLFhpO.kWpbVmpiqDpFGIqXcLFhpO 41->55 47 C:\Users\user\AppData\...47wxMISeIez.exe.com, PE32 41->47 dropped 49 C:\Users\user\AppData\...49wxMISeIez.url, MS 41->49 dropped file17
Threat name:
Win32.Backdoor.Generic
Status:
Suspicious
First seen:
2021-10-30 13:02:04 UTC
AV detection:
8 of 28 (28.57%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery persistence spyware stealer suricata
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Looks up external IP address via web service
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
suricata: ET MALWARE Arechclient2 Backdoor CnC Init
Unpacked files
SH256 hash:
9ba54f39cc0dd5dbf7d67b1234896cd9c59abba8bd201f77084cc066589f7892
MD5 hash:
a0c6d87334bac7bf201f500a44cc7563
SHA1 hash:
e61eb11ee4dee1a9336fc89c3b38c8b36f3612de
SH256 hash:
e439f02b72a882498d512689f380e1323c4d8342578fe8608e81061cf4a8aee1
MD5 hash:
3d90ab79b9719aded136b7cd437ebb21
SHA1 hash:
dbec6e868a293cb0bd58d35191b1423ab8942384
SH256 hash:
1a7075ca044dd3be84270c4e3a281e3708e5bd6e3499d6bf664160b73c0bd1a5
MD5 hash:
497287b2c0270f7502b8797c72b36055
SHA1 hash:
6aecc99c90043fb9df40f38436c0886aee321121
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 1a7075ca044dd3be84270c4e3a281e3708e5bd6e3499d6bf664160b73c0bd1a5

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-10-30 16:51:38 UTC

url : hxxp://5.181.132.165/myblog/posts/174.exe