MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 271ef3c1d022829f0b15f2471d05a28d4786abafd0a9e1e742bde3f6b36872ad. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cuba


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 271ef3c1d022829f0b15f2471d05a28d4786abafd0a9e1e742bde3f6b36872ad
SHA3-384 hash: f80921a0edc69b283058d50d026483779603b6a96a020e24e1d9bae6b6df38e78d6e09d9ee1539643670922988040ea9
SHA1 hash: e8d0c95621a19131ef9480e58a8d6dd3d15c9acd
MD5 hash: a12e733ddbe6f404b27474fa0e5de61d
humanhash: two-nineteen-robert-video
File name:aam_sysadmin@protonmail_com
Download: download sample
Signature Cuba
File size:1'156'608 bytes
First seen:2020-08-03 11:03:52 UTC
Last seen:2020-08-03 11:38:58 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 56bf04b1246e7bd71ba0bddbd47cd745 (1 x Cuba)
ssdeep 12288:xtwee4XgIijsCMtcTCWVRapiyC9vwic8CPK3EOnA+u+:8efgIiICMtIChp8N2K3EOAK
Threatray 7 similar samples on MalwareBazaar
TLSH 1235CF11756CAC2EE0EF3B70DD7287E54A607C61A874C9AA37B0BE6CEC702905835776
Reporter JAMESWT_WT
Tags:cuba

Intelligence


File Origin
# of uploads :
2
# of downloads :
212
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Moving a recently created file
Sending a UDP request
Reading critical registry keys
Encrypting user's files
Result
Threat name:
Unknown
Detection:
malicious
Classification:
rans.spyw
Score:
56 / 100
Signature
Machine Learning detection for sample
May encrypt documents and pictures (Ransomware)
Writes many files with high entropy
Yara detected Keylogger Generic
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Zenpak
Status:
Malicious
First seen:
2020-08-03 11:05:09 UTC
File Type:
PE (Exe)
Extracted files:
152
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
ransomware
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Deletes itself
Malware family:
CryptOne
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments