MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1e83eb35f2b4519866c3a568749eaa4627251fc07a7f7afa5e420f5cd5dee950. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



EternityStealer


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 1e83eb35f2b4519866c3a568749eaa4627251fc07a7f7afa5e420f5cd5dee950
SHA3-384 hash: 639c16625970323f61bdff5300679109fc600e42631d6a510af445ae6e443e68b5680040b826576c9afa2347fee7db4a
SHA1 hash: b92d19b6c383b6092b802a569fc4d144dcb3d8dd
MD5 hash: ff1b1bbeba9129052c8756e412112ea7
humanhash: social-jupiter-hamper-yellow
File name:111.90.151.174_7777__run.bat
Download: download sample
Signature EternityStealer
File size:449 bytes
First seen:2022-10-19 17:07:12 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/plain
ssdeep 12:QJe9LLh8zVb3OXgA99FOF9Kgk182k1UOVqNHSuVM1tWt6GHk9UIWn:m4+Vb+RW9KgOthO4wuVM86GHDx
TLSH T144F05C866C3F495FD697EF8546E10607D53641D270094711705528A716578CE70BD2D8
Reporter ov3rflow1
Tags:bat EternityStealer malw

Intelligence


File Origin
# of uploads :
1
# of downloads :
212
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
avemaria
ID:
1
File name:
http://111.90.151.174:7777/Ransomworm.exe
Verdict:
Malicious activity
Analysis date:
2022-10-19 16:21:15 UTC
Tags:
loader trojan rat stealer avemaria warzone

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a window
Sending a custom TCP request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
cmd.exe hacktool packed
Result
Verdict:
UNKNOWN
Result
Threat name:
Eternity
Detection:
malicious
Classification:
evad.rans.troj
Score:
100 / 100
Signature
Antivirus detection for dropped file
Deletes itself after installation
Deletes shadow drive data (may be related to ransomware)
Disables the Windows task manager (taskmgr)
Disables Windows Defender (deletes autostart)
Found Tor onion address
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sets file extension default program settings to executables
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses known network protocols on non-standard ports
Uses ping.exe to check the status of other devices and networks
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Costura Assembly Loader
Yara detected Eternity Locker
Yara detected Eternity Worm
Yara detected Generic Downloader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 726292 Sample: 111.90.151.174_7777__run.bat Startdate: 19/10/2022 Architecture: WINDOWS Score: 100 87 i.ibb.co 2->87 101 Malicious sample detected (through community Yara rule) 2->101 103 Antivirus detection for dropped file 2->103 105 Multi AV Scanner detection for dropped file 2->105 107 9 other signatures 2->107 13 cmd.exe 1 2->13         started        15 Ransomware.exe 2->15         started        18 Ransomware.exe 2->18         started        signatures3 process4 dnsIp5 20 cmd.exe 1 13->20         started        22 conhost.exe 13->22         started        91 192.168.11.1 unknown unknown 15->91 24 cmd.exe 15->24         started        process6 process7 26 Ransomworm.exe 15 117 20->26         started        30 curl.exe 2 20->30         started        33 reg.exe 1 1 20->33         started        39 2 other processes 20->39 35 conhost.exe 24->35         started        37 chcp.com 24->37         started        dnsIp8 73 C:\Users\user\Desktop\PWZOQIFCAN.exe, PE32 26->73 dropped 75 C:\Users\...\PWZOQIFCAN-vpb.3pm.scr (copy), PE32 26->75 dropped 77 C:\Users\...\PWZOQIFCAN-lri.fdp.scr (copy), PE32 26->77 dropped 81 101 other malicious files 26->81 dropped 111 Multi AV Scanner detection for dropped file 26->111 113 Deletes itself after installation 26->113 41 Ransomware.exe 1 4 26->41         started        89 111.90.151.174, 49836, 49837, 49838 SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY Malaysia 30->89 79 C:\Users\user\Desktop\Ransomworm.exe, PE32 30->79 dropped 115 Disables Windows Defender (deletes autostart) 33->115 file9 signatures10 process11 file12 71 C:\Users\user\AppData\...\Ransomware.exe, PE32 41->71 dropped 109 Multi AV Scanner detection for dropped file 41->109 45 cmd.exe 1 41->45         started        signatures13 process14 signatures15 117 Uses schtasks.exe or at.exe to add and modify task schedules 45->117 119 Uses ping.exe to check the status of other devices and networks 45->119 48 Ransomware.exe 18 4 45->48         started        53 PING.EXE 1 45->53         started        55 conhost.exe 45->55         started        57 2 other processes 45->57 process16 dnsIp17 83 i.ibb.co 51.210.32.106, 443, 49841, 49842 OVHFR France 48->83 65 C:\Users\user\Desktop\DQOFHVHTMG.xlsx, data 48->65 dropped 67 C:\Users\user\Desktop\...\UBVUNTSCZJ.mp3, data 48->67 dropped 69 C:\Users\user\Desktop\...\BXAJUJAOEO.docx, data 48->69 dropped 93 Multi AV Scanner detection for dropped file 48->93 95 Sets file extension default program settings to executables 48->95 97 Modifies existing user documents (likely ransomware behavior) 48->97 99 Disables the Windows task manager (taskmgr) 48->99 59 cmd.exe 48->59         started        85 127.0.0.1 unknown unknown 53->85 file18 signatures19 process20 process21 61 conhost.exe 59->61         started        63 chcp.com 59->63         started       
Verdict:
unknown
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments