MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 206de75058a7dfa0b96784965baab63a137f2e89a97e623842e7d0bb3f12c2fc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Hive


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 206de75058a7dfa0b96784965baab63a137f2e89a97e623842e7d0bb3f12c2fc
SHA3-384 hash: cc92a5dbd2220266de36d4f1cc8b43f00f21e6b1e200982027b9abfaa67c32cd9f2afce5994d7f13ba63aec0276383c9
SHA1 hash: 0bbde5e6b3aefc33014ec3c1f1e61d8664a33a75
MD5 hash: 23f82ce9f5f8e02614b31cc0810e0d5f
humanhash: lion-pluto-fish-texas
File name:206de75058a7dfa0b96784965baab63a137f2e89a97e623842e7d0bb3f12c2fc
Download: download sample
Signature Hive
File size:425'998 bytes
First seen:2022-04-14 14:59:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d6247b74ff5623cf80dd1bb6359eeaea (7 x Hive)
ssdeep 6144:uBi1E8KajuJy9wZv46fuv1Y3JexJARe3L3htJrYyix/lyh4C1eLVa5wcHTC4p8eC:oyz9YOAozJUUh48eUGcHTDaI3dm/
Threatray 10 similar samples on MalwareBazaar
TLSH T1F3948C05F983D6BEC863587014BFF23BE630591D4102CF6BEFE59D74BA2AB50960960E
TrID 38.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
20.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
13.0% (.EXE) Win64 Executable (generic) (10523/12/4)
8.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter Arkbird_SOLG
Tags:exe Hive Ransomware

Intelligence


File Origin
# of uploads :
1
# of downloads :
498
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
sample.exe
Verdict:
Malicious activity
Analysis date:
2022-04-13 06:49:38 UTC
Tags:
ransomware stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug expand.exe filecoder overlay
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 609480 Sample: sUBX1bJQbo Startdate: 14/04/2022 Architecture: WINDOWS Score: 48 10 Multi AV Scanner detection for submitted file 2->10 6 sUBX1bJQbo.exe 1 2->6         started        process3 process4 8 conhost.exe 6->8         started       
Threat name:
Win32.Ransomware.Hive
Status:
Malicious
First seen:
2022-04-07 16:32:45 UTC
File Type:
PE (Exe)
AV detection:
24 of 42 (57.14%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:hive
Unpacked files
SH256 hash:
206de75058a7dfa0b96784965baab63a137f2e89a97e623842e7d0bb3f12c2fc
MD5 hash:
23f82ce9f5f8e02614b31cc0810e0d5f
SHA1 hash:
0bbde5e6b3aefc33014ec3c1f1e61d8664a33a75
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments