MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 23906739f99511519d539a4fa691df58369028cb908ba5a442270a0551d1be3f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 4 File information Comments

SHA256 hash: 23906739f99511519d539a4fa691df58369028cb908ba5a442270a0551d1be3f
SHA3-384 hash: 7b7c6b4dff5d9264c757e94b1f2c58400b507e061bcedd6b4a337323c6243e1c8c6d402af5c34901a733e1390cac9bd4
SHA1 hash: 870531373a7e0959564446dbf58d58954c31c53c
MD5 hash: e5f4f4a03daba461f0e5c996449cf197
humanhash: september-papa-hotel-johnny
File name:SecuriteInfo.com.Trojan.Autoit.Wirus.25568.24843
Download: download sample
File size:1'725'328 bytes
First seen:2024-01-25 05:23:41 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash afcdf79be1557326c854b6e20cb900a7 (1'102 x FormBook, 936 x AgentTesla, 399 x RemcosRAT)
ssdeep 24576:HAHnh+eWsN3skA4RV1Hom2KXMmHa+BAlnTWarrh5yfX9RgVtuJ6qLMhm5:6h+ZkldoPK8YaEAlZrWlRSugMv
TLSH T17F85BF3B73514025DE5E80339681B271A9BF6E090597842E42DB3AB5BD3CEED533E227
TrID 63.7% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
11.6% (.EXE) Win64 Executable (generic) (10523/12/4)
7.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
5.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.9% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 67676767e76767e7 (1 x LummaStealer, 1 x Stealc)
Reporter SecuriteInfoCom
Tags:exe signed

Code Signing Certificate

Organisation:Tenorshare Co., Ltd.
Issuer:DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
Algorithm:sha256WithRSAEncryption
Valid from:2021-07-07T00:00:00Z
Valid to:2024-07-11T23:59:59Z
Serial number: 0170c5d8e62abac7db20918f8c95b7e8
Intelligence: 25 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: ef4d9d322077e97381cffec61c1f7a70cdc7b16a87f85fcbcdcd2682737cff2d
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
366
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Creating a file
Creating a file in the %temp% directory
Using the Windows Management Instrumentation requests
Launching a process
Сreating synchronization primitives
Searching for the window
Searching for synchronization primitives
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
autoit fingerprint keylogger overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.evad
Score:
48 / 100
Signature
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Behaviour
Behavior Graph:
Verdict:
unknown
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
Checks SCSI registry key(s)
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Drops file in System32 directory
Enumerates connected drives
Unpacked files
SH256 hash:
23906739f99511519d539a4fa691df58369028cb908ba5a442270a0551d1be3f
MD5 hash:
e5f4f4a03daba461f0e5c996449cf197
SHA1 hash:
870531373a7e0959564446dbf58d58954c31c53c
Detections:
AutoIT_Compiled
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments