MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 281de330768f7e2231f3984b2fbac04bf9f7f2b2d4fb3c2f91d6ba2eab8d546c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 281de330768f7e2231f3984b2fbac04bf9f7f2b2d4fb3c2f91d6ba2eab8d546c
SHA3-384 hash: 68ebe8e81ee2f345b8be8ddec22cf68d6b644c747ff5260755828445a1bdfd232001319aa1afe8bb12c6171b5bb63810
SHA1 hash: dcc8dcb2cf8debef05959f09054fab0f2e08b3f8
MD5 hash: e9a389a12256716b394c80a05e6065e0
humanhash: fifteen-avocado-king-sodium
File name:e9a389a12256716b394c80a05e6065e0.exe
Download: download sample
File size:555'008 bytes
First seen:2020-12-28 20:01:40 UTC
Last seen:2020-12-28 21:41:39 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2144f9c12885542d4a4f22de64e840e1 (26 x RedLineStealer, 24 x Smoke Loader, 13 x RaccoonStealer)
ssdeep 12288:66/FUsPq/zQixfgi2wstbSE5n0f0Aa0nfelCAxPUP:N9EzKifst2ER8aaWlCA50
Threatray 1 similar samples on MalwareBazaar
TLSH 61C4124A0668A4E2EB21DE31735FB6E25C413F620E6126662C1EE5E4043DDCFD1D7A8F
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
175
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e9a389a12256716b394c80a05e6065e0.exe
Verdict:
Malicious activity
Analysis date:
2020-12-28 20:03:11 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Possible injection to a system process
Blocking the Windows Defender launch
Rewriting of the hard drive's master boot record
Unauthorized injection to a system process
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Contains functionality to infect the boot sector
Machine Learning detection for sample
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2020-12-28 20:02:07 UTC
AV detection:
15 of 29 (51.72%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
bootkit persistence upx
Behaviour
Suspicious use of AdjustPrivilegeToken
Writes to the Master Boot Record (MBR)
Unpacked files
SH256 hash:
d82739d77c727a51452e3631fcd64fd6188d21c4793767e6c1bc94978e6920f7
MD5 hash:
a072a5d0ee0bc47800c4984b6f0e42bf
SHA1 hash:
4628649162945686f611fe878c0fbe2b1013f758
SH256 hash:
281de330768f7e2231f3984b2fbac04bf9f7f2b2d4fb3c2f91d6ba2eab8d546c
MD5 hash:
e9a389a12256716b394c80a05e6065e0
SHA1 hash:
dcc8dcb2cf8debef05959f09054fab0f2e08b3f8
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments