MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 283504cf22b0ecae1990d747b82fee22f3753efc9d51faa9e0e4942ab94d04bf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments

SHA256 hash: 283504cf22b0ecae1990d747b82fee22f3753efc9d51faa9e0e4942ab94d04bf
SHA3-384 hash: a57bbcac463caf100f9b8019bb1e3b82aac120f4e73ace11c6e911b1d3cd94d2ff8a62058d86d8bc5c27515a978a9c44
SHA1 hash: c2ae751cf2dcb69eeb3ce653ade9aee8aad12eb6
MD5 hash: 5de2215eb577681824537afe03342af9
humanhash: apart-fanta-tennessee-william
File name:WindowsMediaCenter.bin
Download: download sample
File size:6'298'112 bytes
First seen:2022-09-24 17:05:47 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d4c078d6b954563070595f416743ef7a
ssdeep 98304:rbX2rNXeDJWg8tdGoYpHO8yZQM+Qvwzpj/ttheJbN/jeRUXxCkSuCdkr7zQUj:ri4JOdGozB+Qvmprj0bRjyUudkE
Threatray 1 similar samples on MalwareBazaar
TLSH T1A0560232A68295B2D4E3013481A35FBF597DBF201320CED797D05AD698657E2723F3A2
TrID 40.3% (.EXE) Win64 Executable (generic) (10523/12/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4505/5/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter JAMESWT_WT
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
306
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
tsetup.exe
Verdict:
Malicious activity
Analysis date:
2022-09-24 17:00:15 UTC
Tags:
evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Launching a process
Creating a file
Sending a custom TCP request
Creating a process from a recently created file
DNS request
Sending an HTTP POST request
Sending an HTTP GET request
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed rat
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
64 / 100
Signature
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Potentially malicious time measurement code found
Uses cmd line tools excessively to alter registry or file data
Uses dynamic DNS services
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 709090 Sample: WindowsMediaCenter.bin.exe Startdate: 24/09/2022 Architecture: WINDOWS Score: 64 93 Multi AV Scanner detection for submitted file 2->93 95 Uses dynamic DNS services 2->95 10 WindowsMediaCenter.bin.exe 4 2->10         started        13 WinMdLdr.exe 1 2->13         started        15 WinMdLdr.exe 1 2->15         started        process3 file4 79 C:\Users\user\...\WindowsMediaCenter.exe, PE32 10->79 dropped 81 C:\Users\user\AppData\...\WinMdLdr.exe, PE32 10->81 dropped 17 WinMdLdr.exe 1 10->17         started        19 cmd.exe 1 10->19         started        21 cmd.exe 10->21         started        23 cmd.exe 1 13->23         started        25 WindowsMediaCenter.exe 13->25         started        27 cmd.exe 1 15->27         started        29 WindowsMediaCenter.exe 15->29         started        process5 process6 31 WindowsMediaCenter.exe 16 17->31         started        36 cmd.exe 1 17->36         started        38 conhost.exe 19->38         started        40 cmd.exe 2 19->40         started        50 2 other processes 21->50 42 cmd.exe 1 23->42         started        44 conhost.exe 23->44         started        46 cmd.exe 1 27->46         started        48 conhost.exe 27->48         started        dnsIp7 83 winterknowing.ddns.net 194.87.216.56, 49697, 80 AS-REGRU Russian Federation 31->83 85 wtfismyip.com 95.217.228.176, 49698, 80 HETZNER-ASDE Germany 31->85 87 192.168.2.1 unknown unknown 31->87 77 C:\Users\user\...\WindowsMediaCenter64.exe, PE32+ 31->77 dropped 89 May check the online IP address of the machine 31->89 52 WindowsMediaCenter64.exe 31->52         started        55 cmd.exe 1 31->55         started        91 Uses cmd line tools excessively to alter registry or file data 36->91 57 cmd.exe 1 36->57         started        59 conhost.exe 36->59         started        61 reg.exe 1 42->61         started        63 reg.exe 1 46->63         started        file8 signatures9 process10 signatures11 97 Potentially malicious time measurement code found 52->97 65 conhost.exe 55->65         started        67 sc.exe 1 55->67         started        99 Uses cmd line tools excessively to alter registry or file data 57->99 69 reg.exe 1 1 57->69         started        71 conhost.exe 61->71         started        73 conhost.exe 63->73         started        process12 process13 75 conhost.exe 69->75         started       
Threat name:
Win32.Trojan.WaleDac
Status:
Malicious
First seen:
2022-09-24 17:06:19 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence
Behaviour
Suspicious use of WriteProcessMemory
Modifies registry key
Enumerates physical storage devices
Launches sc.exe
Adds Run key to start application
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
283504cf22b0ecae1990d747b82fee22f3753efc9d51faa9e0e4942ab94d04bf
MD5 hash:
5de2215eb577681824537afe03342af9
SHA1 hash:
c2ae751cf2dcb69eeb3ce653ade9aee8aad12eb6
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments