MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1ebbf5127ddc28f2e0e70a630acea23bf8734ea6405811b8e35c9acaca5b7174. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 1ebbf5127ddc28f2e0e70a630acea23bf8734ea6405811b8e35c9acaca5b7174
SHA3-384 hash: 5797ff0a68f00b8a56c7e78201833cf38176ebe3977b3bd81279d6d7f65f57a761d00fec85a265905e097c9ab62107a1
SHA1 hash: 070b25794621f84b04e82535950562386794e669
MD5 hash: 5bc7c768f38e8a5e04fd6022e5cf1d19
humanhash: echo-diet-spring-lithium
File name:1ebbf5127ddc28f2e0e70a630acea23bf8734ea6405811b8e35c9acaca5b7174
Download: download sample
Signature NanoCore
File size:293'888 bytes
First seen:2020-07-06 07:06:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d341da41cdbebb27387f1bf2c0fabf2f (1 x NanoCore)
ssdeep 6144:cA4U+Ajp/zfZzwvNfvtGblz9Isfq+gGctAPKVy:Z4MVzfZsFfvtGPIsfq3TVy
Threatray 20 similar samples on MalwareBazaar
TLSH 9554D022F6CBE725D93A2472C6CEE5F28292FF22C5110D73A7693F38BD744061944A79
Reporter JAMESWT_WT
Tags:NanoCore

Intelligence


File Origin
# of uploads :
1
# of downloads :
75
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file
Deleting a recently created file
Creating a window
Enabling autorun with Startup directory
Threat name:
Win32.Trojan.Skeeyah
Status:
Malicious
First seen:
2019-03-03 20:32:59 UTC
File Type:
PE (Exe)
Extracted files:
154
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Program crash
Drops startup file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments