MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1cf923ca8729ef09965b1d808fa93cd9de374cde86c86830f31a05ab39284261. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stop
Vendor detections: 15
| SHA256 hash: | 1cf923ca8729ef09965b1d808fa93cd9de374cde86c86830f31a05ab39284261 |
|---|---|
| SHA3-384 hash: | 79e3ec8c60641f33ef43f99ed12347bfa92ca3d77cbb31c5c7c99db54f5491ede7ffedade0a2d9817b4a3cf9ab0b04f7 |
| SHA1 hash: | d5f189656dad95460880825bd713888b17eb35f1 |
| MD5 hash: | fa04b614c6cf028566fe6bfe7e5e2890 |
| humanhash: | fillet-moon-july-lake |
| File name: | 1cf923ca8729ef09965b1d808fa93cd9de374cde86c86830f31a05ab39284261 |
| Download: | download sample |
| Signature | Stop |
| File size: | 792'576 bytes |
| First seen: | 2022-03-29 04:44:34 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 8b43e1344b27321e8381c60a4a19bca2 (6 x Stop, 4 x RedLineStealer, 1 x Ransomare.Stop) |
| ssdeep | 12288:pf04aq8lt6iGJvlBIcDgAU+FJw/6bizAIX+GEZAGZ/ubFHNxZznVTlIJgq/I6B0J:O4atTWXkb/6b3SsAAqtnztymcIfHZR |
| Threatray | 1'013 similar samples on MalwareBazaar |
| TLSH | T100F401007B50D035E5B712F45A7693A8A93EBDB15B7860CB67E16AEB1230AF4EC30357 |
| File icon (PE): | |
| dhash icon | badacabecee6baa6 (95 x Stop, 87 x RedLineStealer, 62 x Smoke Loader) |
| Reporter | |
| Tags: | exe Stop |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | MALWARE_Win_STOP |
|---|---|
| Author: | ditekSHen |
| Description: | Detects STOP ransomware |
| Rule name: | SUSP_XORed_URL_in_EXE |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | SUSP_XORed_URL_in_EXE_RID2E46 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | win_stop_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.stop. |
| Rule name: | XOREngine_Misc_XOR_Func |
|---|---|
| Author: | smiller cc @florian @wesley idea on implementation with yara's built in XOR function |
| Description: | Use with care, https://twitter.com/cyb3rops/status/1237042104406355968 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.