MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2056fdb66896bbbf491ea0d31c64c5937f05fe1311dab22fd1dfa933038ef65b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 2056fdb66896bbbf491ea0d31c64c5937f05fe1311dab22fd1dfa933038ef65b
SHA3-384 hash: f50cd311fe89b3986cc86f831dc3c37bfeb7f2f085f6d83bb661acff934411626bd5eb0311456e03fce16be65a7cef8b
SHA1 hash: 5234bba8874bfc71fc540baa73262d4e43a5d68e
MD5 hash: 35017215e01c6b1a44e76948c0aa5ba4
humanhash: sink-artist-september-purple
File name:35017215e01c6b1a44e76948c0aa5ba4.exe
Download: download sample
File size:761'856 bytes
First seen:2021-10-03 16:24:44 UTC
Last seen:2021-10-03 16:54:48 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e1dc734f9d3fd8ffe237c21274508ba5 (4 x RedLineStealer, 2 x RaccoonStealer, 2 x ArkeiStealer)
ssdeep 12288:HYAsFS4L88u/IUvJXlGq5WGZZUcN+7Zvf1PyvEKnsy3dVZvDL6+zxF6L:HYPXL88WzlrEG+7Z1mnns4JL6L
Threatray 12 similar samples on MalwareBazaar
TLSH T11FF401193181CFF2E6B206F1AB19C3F0496CBD6E4949560F2758376E7E3D3928A22753
File icon (PE):PE icon
dhash icon fcfcd4f4d4d4d8c0 (23 x RedLineStealer, 21 x RaccoonStealer, 6 x Smoke Loader)
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
91
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
35017215e01c6b1a44e76948c0aa5ba4.exe
Verdict:
Suspicious activity
Analysis date:
2021-10-03 16:27:32 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 495884 Sample: S8wVvHW6v0.exe Startdate: 03/10/2021 Architecture: WINDOWS Score: 52 17 Multi AV Scanner detection for submitted file 2->17 19 Machine Learning detection for sample 2->19 6 S8wVvHW6v0.exe 2->6         started        process3 process4 8 WerFault.exe 23 9 6->8         started        11 WerFault.exe 2 9 6->11         started        file5 13 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 8->13 dropped 15 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 11->15 dropped
Threat name:
Win32.Trojan.Fragtor
Status:
Malicious
First seen:
2021-10-03 16:25:20 UTC
AV detection:
24 of 45 (53.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Unpacked files
SH256 hash:
2056fdb66896bbbf491ea0d31c64c5937f05fe1311dab22fd1dfa933038ef65b
MD5 hash:
35017215e01c6b1a44e76948c0aa5ba4
SHA1 hash:
5234bba8874bfc71fc540baa73262d4e43a5d68e
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 2056fdb66896bbbf491ea0d31c64c5937f05fe1311dab22fd1dfa933038ef65b

(this sample)

  
Delivery method
Distributed via web download

Comments