MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1fb9a15f04e22fa2ffed97cc9ea058210140517821eae6a84ab2dead604a8179. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments 1

SHA256 hash: 1fb9a15f04e22fa2ffed97cc9ea058210140517821eae6a84ab2dead604a8179
SHA3-384 hash: bad47996e47a218bb2d4f68e41f9979e36b30f423ac840ca6409fbe860260ea74ba0686e3189b5d16161b6c1f85b0657
SHA1 hash: 3aa5af8c7d086a9efc085a218843efe2bad19774
MD5 hash: 138ab2fed2a328e0527968d304844f5f
humanhash: diet-autumn-victor-happy
File name:138ab2fed2a328e0527968d304844f5f.exe
Download: download sample
File size:295'936 bytes
First seen:2021-05-20 18:29:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6b55f630541fdcd5757b3e440357a9c3 (1 x RedLineStealer, 1 x DanaBot)
ssdeep 6144:obMLtB/tUN49xvSTroe4klf5ckS+aNgg5DEokXsTRVjG:o0tB1UNkxvSTcklC+e53kXsLj
Threatray 1'433 similar samples on MalwareBazaar
TLSH 0E545B2066A3C034F1FF16F889B58279652A7DE15B3460FBE2C52ADE56706E4AC3134F
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
82
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Sending a UDP request
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-05-20 18:09:24 UTC
AV detection:
16 of 28 (57.14%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Creates scheduled task(s)
Suspicious use of WriteProcessMemory
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 1fb9a15f04e22fa2ffed97cc9ea058210140517821eae6a84ab2dead604a8179

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-20 19:30:48 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0012.001] Anti-Static Analysis::Argument Obfuscation
1) [C0027.009] Cryptography Micro-objective::RC4::Encrypt Data
2) [C0021.004] Cryptography Micro-objective::RC4 PRGA::Generate Pseudo-random Sequence
3) [C0045] File System Micro-objective::Copy File
4) [C0047] File System Micro-objective::Delete File
5) [C0049] File System Micro-objective::Get File Attributes
6) [C0051] File System Micro-objective::Read File
7) [C0052] File System Micro-objective::Writes File
8) [C0033] Operating System Micro-objective::Console
9) [C0040] Process Micro-objective::Allocate Thread Local Storage
10) [C0043] Process Micro-objective::Check Mutex
11) [C0041] Process Micro-objective::Set Thread Local Storage Value
12) [C0018] Process Micro-objective::Terminate Process
13) [C0039] Process Micro-objective::Terminate Thread