MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1f71d52bc7b8d2a3170e913d1aa562207216c8c962278874aa7b0126674ffe73. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stop
Vendor detections: 14
| SHA256 hash: | 1f71d52bc7b8d2a3170e913d1aa562207216c8c962278874aa7b0126674ffe73 |
|---|---|
| SHA3-384 hash: | ecc982577bba19c6827426f96226c0dc84649dcf5dca6f5a4270e6292ccf0b0ee5b93344d22186122ce441946014e7b6 |
| SHA1 hash: | bbe47fe97a6c3a9df5a43cf5e47f36a8a541e5f7 |
| MD5 hash: | a611c4ec85cd4943aed8a021714a2454 |
| humanhash: | north-fix-tennis-georgia |
| File name: | a611c4ec85cd4943aed8a021714a2454.exe |
| Download: | download sample |
| Signature | Stop |
| File size: | 870'912 bytes |
| First seen: | 2022-09-08 10:00:39 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | e69908863e17da2ed40226e60570d6a5 (3 x Smoke Loader, 3 x Stop, 1 x RecordBreaker) |
| ssdeep | 12288:5oaWzr54WmboLGra4sj/aoJuwiLt8g6tqlO7PP068KUzfWXZcB:5vCFVLGmnWoJ3Qt8g6td7XTIWJcB |
| Threatray | 1'722 similar samples on MalwareBazaar |
| TLSH | T1BE0513C17693C471C4EA0070886AEBC025BFAC7219A69D8BFB583D6D4EBC7E16957343 |
| TrID | 32.2% (.EXE) Win64 Executable (generic) (10523/12/4) 20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 15.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 13.7% (.EXE) Win32 Executable (generic) (4505/5/1) 6.2% (.EXE) OS/2 Executable (generic) (2029/13) |
| File icon (PE): | |
| dhash icon | 480c1c4c4f590b14 (113 x Smoke Loader, 92 x RedLineStealer, 83 x Amadey) |
| Reporter | |
| Tags: | exe Stop |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://116.202.179.139/1375 | https://threatfox.abuse.ch/ioc/848397/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
0794c0176a6cc0f06c7ad272c35b45a7a64033f13f5cdb91d79a61f5862253f8
6d25aec23c5cb12abaa93ca1c5f5aeb17958b8050bedc05d45185c28e79c148e
c477ac60575519a3cb7c416b2e03827d6e89add5358ca761cb5815fc72d44e43
56cef269350067dde3634111d825fb25cf87a2c64b00250c30923fd1f187dd48
27615d90a89b6a78d835c0a23f0dae5aa155ab24f03b347a9f7e5f43d66ac88d
a8969ba48710f953bb9687ff490fef23be5d5f0ce3f7cd3000de00d03b213132
b5002059d1f9eda9126220a9cdfa39e6f8f41231abe603a9affdf0fc36c6d5ad
aab3c11ef327a40bafa481e779f846d79395339d37716f16d8a08ffb6fe96263
af2bbb98fc6a9b6140f53e7da026aa6710e1774295a364e777e48732a06d3ea5
0e2aaf64f05ab8e6377e896162a0c0beb63410d30e612182c9910216d7469f63
ef2103b223e899c11db31e40f218969f5760c6b41030da2efe9b68b2ccce64bd
fd43f6f5e01e3306f2f7c5fea73b0c19b5acba62d7bc5bbd26602c56555ea28b
1e3e5c2551c5433f1ff2b375b527dd6e1966a32753a8f297c8be1b79e937b361
aff93a8e6265ae3f03f5a2faffb22b720a69e9948de001246cde0c7099ae05f8
1f71d52bc7b8d2a3170e913d1aa562207216c8c962278874aa7b0126674ffe73
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | MALWARE_Win_STOP |
|---|---|
| Author: | ditekSHen |
| Description: | Detects STOP ransomware |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | SUSP_XORed_URL_in_EXE |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | SUSP_XORed_URL_in_EXE_RID2E46 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | win_stop_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.stop. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.