MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1e80bf1bca4a8841d973e8bf1f88e2d7cce3160793f23b2351db0aa7ea23af4e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 1e80bf1bca4a8841d973e8bf1f88e2d7cce3160793f23b2351db0aa7ea23af4e
SHA3-384 hash: bd702deea1f6f97ec012847d5ad373f4bcccd5434e7162a0c6aa8e895eb38810f179015dfad1abee46d41e6e3e89c2e7
SHA1 hash: 9670d9edaa8305f39acb3402f4ad62955e5a73b8
MD5 hash: 385eccb9e711368035f0f329f98255ec
humanhash: kitten-hotel-five-avocado
File name:hv.exe
Download: download sample
File size:244'880 bytes
First seen:2021-09-06 19:33:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f2b2e356d2d0eb1b0d5da0b0d4f5e934
ssdeep 3072:zASUot4cIAg0Fuj7M1iUa2LQR/wkLsrA5vmUBmHHcTnoeYYHIwG1Opm92BuiFwdn:eLAORwAtmBHHc8eY5XOpwiFEHt1CB5O
Threatray 6 similar samples on MalwareBazaar
TLSH T1DC348F0375D18473EA7209355C78FB694E2FBD200DA1C67B63E40A7E8E742C09D26BB6
Reporter James_inthe_box
Tags:exe signed

Code Signing Certificate

Organisation:Intel(R) Embedded Subsystems and IP Blocks Group
Issuer:Intel External Issuing CA 7B
Algorithm:sha256WithRSAEncryption
Valid from:2016-11-08T10:13:40Z
Valid to:2018-11-08T10:13:40Z
Serial number: 56000001757376cd78ad000c9a000000000175
Thumbprint Algorithm:SHA256
Thumbprint: 534b9b1a31a38b4e0bf9a291f408337c25a2e011d460fdff495ce473fb168a8e
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
104
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
hv.exe
Verdict:
Malicious activity
Analysis date:
2021-09-06 19:35:41 UTC
Tags:
trojan tinynuke

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a file
Changing the Zone.Identifier stream
Running batch commands
Creating a process with a hidden window
Launching a process
Creating a process from a recently created file
Adding an access-denied ACE
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Creates autostart registry keys with suspicious names
Found C&C like URL pattern
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to delay execution (extensive OutputDebugStringW loop)
Uses schtasks.exe or at.exe to add and modify task schedules
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 478542 Sample: hv.exe Startdate: 06/09/2021 Architecture: WINDOWS Score: 92 51 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->51 53 Multi AV Scanner detection for submitted file 2->53 55 Machine Learning detection for sample 2->55 57 Found C&C like URL pattern 2->57 7 hv.exe 2 5 2->7         started        11 403L.exe 2->11         started        13 403L.exe 2->13         started        15 2 other processes 2->15 process3 file4 43 C:\ProgramData\...\403L.exe, PE32 7->43 dropped 45 C:\ProgramData\...\403L.exe:Zone.Identifier, ASCII 7->45 dropped 59 Creates autostart registry keys with suspicious names 7->59 61 Tries to delay execution (extensive OutputDebugStringW loop) 7->61 63 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 7->63 17 cmd.exe 1 7->17         started        20 403L.exe 12 7->20         started        23 cmd.exe 1 7->23         started        25 4 other processes 7->25 65 Multi AV Scanner detection for dropped file 11->65 67 Machine Learning detection for dropped file 11->67 signatures5 process6 dnsIp7 49 Uses schtasks.exe or at.exe to add and modify task schedules 17->49 27 conhost.exe 17->27         started        29 schtasks.exe 1 17->29         started        47 37.49.230.185, 49726, 49727, 49728 ESTROWEBNL Estonia 20->47 31 conhost.exe 23->31         started        33 icacls.exe 1 23->33         started        35 conhost.exe 25->35         started        37 conhost.exe 25->37         started        39 conhost.exe 25->39         started        41 5 other processes 25->41 signatures8 process9
Threat name:
Win32.Trojan.SpyEye
Status:
Malicious
First seen:
2021-07-10 04:48:00 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
29 of 45 (64.44%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery persistence suricata
Behaviour
Creates scheduled task(s)
NTFS ADS
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Adds Run key to start application
Modifies file permissions
Executes dropped EXE
suricata: ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
Unpacked files
SH256 hash:
1e80bf1bca4a8841d973e8bf1f88e2d7cce3160793f23b2351db0aa7ea23af4e
MD5 hash:
385eccb9e711368035f0f329f98255ec
SHA1 hash:
9670d9edaa8305f39acb3402f4ad62955e5a73b8
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments