MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 236c90cde83b3dc403c3c186193b0d2cd14b067f6b4c840d5f0baee57840eba9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 10
| SHA256 hash: | 236c90cde83b3dc403c3c186193b0d2cd14b067f6b4c840d5f0baee57840eba9 |
|---|---|
| SHA3-384 hash: | 4293810cebfc458e2da64c7be6f442b0cd31eac0551fc26a64a25d2065081590324f44191e648d5e89f080f4893fd51e |
| SHA1 hash: | a7ca95740760a4bb57ef61814ec1579568fbffa2 |
| MD5 hash: | dcf8c8ef55fd294027997128de155b9f |
| humanhash: | east-mars-fourteen-ink |
| File name: | Go.exe |
| Download: | download sample |
| File size: | 2'334'120 bytes |
| First seen: | 2023-12-21 05:22:51 UTC |
| Last seen: | 2024-01-13 00:51:29 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | a85f38e7f91123fad59670d6f5a40ae7 |
| ssdeep | 49152:V2JQb0rvdEeF5XsHuCmDKTkB7a1GwvvnE0jVBTs6vUaB:5wHH0kUHZjA6v/B |
| TLSH | T1CAB55A46B2A148E6D3A68038CCA6E667E771341D47F156FB3680C7D92F33AD17A39312 |
| TrID | 72.7% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 13.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.EXE) Win16 NE executable (generic) (5038/12/1) 2.5% (.EXE) OS/2 Executable (generic) (2029/13) 2.5% (.EXE) Generic Win/DOS Executable (2002/3) |
| File icon (PE): | |
| dhash icon | d4e8d4d4b2b2e8d4 (2 x Heodo) |
| Reporter | |
| Tags: | exe signed |
Code Signing Certificate
| Organisation: | Hefei Pingbo Network Technology Co. Ltd |
|---|---|
| Issuer: | Sectigo Public Code Signing CA EV R36 |
| Algorithm: | sha256WithRSAEncryption |
| Valid from: | 2021-12-10T00:00:00Z |
| Valid to: | 2024-12-09T23:59:59Z |
| Serial number: | 57a099d45032041502d1f8cc008d29cf |
| Intelligence: | 6 malware samples on MalwareBazaar are signed with this code signing certificate |
| Thumbprint Algorithm: | SHA256 |
| Thumbprint: | 7bc3f4174c81089bd374ea1fac11c98047a6d94aeb057d5b09170e99c2dbaacb |
| Source: | This information was brought to you by ReversingLabs A1000 Malware Analysis Platform |
Intelligence
File Origin
# of uploads :
2
# of downloads :
308
Origin country :
ROVendor Threat Intelligence
Detection:
Emotet
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a service
Launching a service
Restart of the analyzed sample
Searching for synchronization primitives
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Enabling autorun for a service
Verdict:
No Threat
Threat level:
10/10
Confidence:
100%
Tags:
control expand explorer greyware lolbin overlay packed remote shell32
Verdict:
Suspicious
Labled as:
Win64/Agent.DDN trojan
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Unknown
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
56 / 100
Signature
Contain functionality to detect virtual machines
Contains functionality to infect the boot sector
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Score:
1%
Verdict:
Benign
File Type:
PE
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2023-11-07 12:43:28 UTC
File Type:
PE+ (Exe)
Extracted files:
22
AV detection:
7 of 23 (30.43%)
Threat level:
2/5
Detection(s):
Suspicious file
Verdict:
unknown
Result
Malware family:
n/a
Score:
6/10
Tags:
bootkit persistence
Behaviour
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
System policy modification
Writes to the Master Boot Record (MBR)
Unpacked files
SH256 hash:
236c90cde83b3dc403c3c186193b0d2cd14b067f6b4c840d5f0baee57840eba9
MD5 hash:
dcf8c8ef55fd294027997128de155b9f
SHA1 hash:
a7ca95740760a4bb57ef61814ec1579568fbffa2
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
exe 236c90cde83b3dc403c3c186193b0d2cd14b067f6b4c840d5f0baee57840eba9
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.