MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



HermeticWiper


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591
SHA3-384 hash: 11331dcad0780d2ba57a5ad73ea3d1d1058e357af448cc3b70762fbf34dd8d55c2671203205d7594c80ec892eb19b77b
SHA1 hash: 61b25d11392172e587d8da3045812a66c3385451
MD5 hash: 3f4a16b29f2f0532b7ce3e7656799125
humanhash: thirteen-coffee-victor-robert
File name:1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591
Download: download sample
Signature HermeticWiper
File size:117'000 bytes
First seen:2022-02-23 21:20:14 UTC
Last seen:2022-05-02 19:46:48 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash fe4a2284122da348258c83ef437fbd7b (2 x HermeticWiper)
ssdeep 1536:sBOoa7Nn52wurilmw9BgjKu1sPPxaSLyqC:sBOoa7P2wxlPwV1qPkSuqC
TLSH T172B326539AEC3CC6D43813B137BFA7E5D72EECA46A90C09E96D01182D57C9533A227E4
File icon (PE):PE icon
dhash icon f0968ee8aae8e8b2 (9 x Urelas, 9 x ValleyRAT, 5 x HermeticWiper)
Reporter Arkbird_SOLG
Tags:exe Hermetica Digital Ltd HermeticWiper signed Ukraine Wiper

Code Signing Certificate

Organisation:Hermetica Digital Ltd
Issuer:DigiCert EV Code Signing CA (SHA2)
Algorithm:sha256WithRSAEncryption
Valid from:2021-04-13T00:00:00Z
Valid to:2022-04-14T23:59:59Z
Serial number: 0c48732873ac8ccebaf8f0e1e8329cec
Intelligence: 5 malware samples on MalwareBazaar are signed with this code signing certificate
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: 14ffc96c8cc2ea2d732ed75c3093d20187a4c72d02654ff4520448ba7f8c7df6
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
7
# of downloads :
1'313
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591
Verdict:
Suspicious activity
Analysis date:
2022-02-23 19:23:50 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the drivers directory
Low-level writing to the hard drive
Creating a service
Launching a service
Loading a system driver
Creating a file in the Windows subdirectories
Creating a file
Sending a custom TCP request
Enabling autorun for a service
Writing to the volume boot record
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
killdisk overlay packed shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
56 / 100
Signature
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to infect the boot sector
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 577709 Sample: 8QnOuJJ3mt Startdate: 23/02/2022 Architecture: WINDOWS Score: 56 23 Multi AV Scanner detection for submitted file 2->23 7 svchost.exe 2->7         started        10 8QnOuJJ3mt.exe 2 2->10         started        13 svchost.exe 2->13         started        15 5 other processes 2->15 process3 file4 25 Changes security center settings (notifications, updates, antivirus, firewall) 7->25 17 MpCmdRun.exe 1 7->17         started        21 C:\Windows\System32\drivers\lxdr.sys, PE32+ 10->21 dropped 27 Contains functionality to infect the boot sector 10->27 signatures5 process6 process7 19 conhost.exe 17->19         started       
Threat name:
Win32.Ransomware.KillDisk
Status:
Malicious
First seen:
2022-02-23 21:07:18 UTC
File Type:
PE (Exe)
Extracted files:
24
AV detection:
24 of 28 (85.71%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Drops file in Drivers directory
Unpacked files
SH256 hash:
1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591
MD5 hash:
3f4a16b29f2f0532b7ce3e7656799125
SHA1 hash:
61b25d11392172e587d8da3045812a66c3385451
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments