MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 291c573996c647508544e8e21bd2764e6e4c834d53d6d2c8903a0001c783764b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazarCall


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 291c573996c647508544e8e21bd2764e6e4c834d53d6d2c8903a0001c783764b
SHA3-384 hash: da6d1de56bb0bf3fb5ab60957cc85635cd23453b8be74ca0b45565542f3765aad6610b9181dd01c720479513442d8d28
SHA1 hash: 04606786daa6313867c7ada1f0c9c925d9b602fb
MD5 hash: efa4b2e7d7016a1f80efff5840de3a18
humanhash: burger-edward-kitten-spring
File name:SecuriteInfo.com.UDS.Trojan.Win32.Injuke.25486.6608
Download: download sample
Signature BazarCall
File size:242'176 bytes
First seen:2021-03-29 21:44:24 UTC
Last seen:2021-04-01 02:50:02 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 787151c6bef6ee11d1d73736521d9ba7 (1 x BazarCall)
ssdeep 6144:NgsO6Xkm0RsQNCR/JG+z5nLGcKYp05dMgSsXMH7/wrtKHRAwrcKxN:7GRsQ6RLhLGO05dMgrXwTKtKxA5w
TLSH 2E34AFB875143CD2E67F577BDA96BCDD23B63722998BA8CD806477C30163726EE12804
Reporter SecuriteInfoCom
Tags:BazarCall

Intelligence


File Origin
# of uploads :
5
# of downloads :
140
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.UDS.Trojan.Win32.Injuke.25486.6608
Verdict:
No threats detected
Analysis date:
2021-03-29 21:49:11 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Sending a UDP request
Running batch commands
Creating a process with a hidden window
Launching a process
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
Allocates memory in foreign processes
Creates multiple autostart registry keys
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Sample uses process hollowing technique
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Uses cmd line tools excessively to alter registry or file data
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 377796 Sample: SecuriteInfo.com.UDS.Trojan... Startdate: 29/03/2021 Architecture: WINDOWS Score: 92 75 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->75 77 Multi AV Scanner detection for submitted file 2->77 12 SecuriteInfo.com.UDS.Trojan.Win32.Injuke.25486.exe 2->12         started        14 cmd.exe 1 2->14         started        17 cmd.exe 1 2->17         started        19 2 other processes 2->19 process3 signatures4 21 cmd.exe 1 12->21         started        99 Uses cmd line tools excessively to alter registry or file data 14->99 24 reg.exe 1 1 14->24         started        26 QB98C22.exe 14->26         started        28 conhost.exe 14->28         started        30 QB98C22.exe 17->30         started        32 conhost.exe 17->32         started        34 reg.exe 1 17->34         started        process5 signatures6 79 Uses ping.exe to sleep 21->79 81 Uses cmd line tools excessively to alter registry or file data 21->81 83 Uses ping.exe to check the status of other devices and networks 21->83 36 SecuriteInfo.com.UDS.Trojan.Win32.Injuke.25486.exe 1 21->36         started        39 conhost.exe 21->39         started        41 PING.EXE 1 21->41         started        85 Creates multiple autostart registry keys 24->85 process7 file8 69 C:\Users\user\AppData\Local\...\QB98C22.exe, PE32+ 36->69 dropped 43 cmd.exe 1 36->43         started        process9 signatures10 89 Uses ping.exe to sleep 43->89 46 QB98C22.exe 1 43->46         started        49 conhost.exe 43->49         started        51 PING.EXE 1 43->51         started        process11 signatures12 101 Creates multiple autostart registry keys 46->101 53 cmd.exe 1 46->53         started        56 conhost.exe 49->56         started        process13 signatures14 87 Uses ping.exe to sleep 53->87 58 QB98C22.exe 1 53->58         started        62 conhost.exe 53->62         started        64 PING.EXE 1 53->64         started        process15 dnsIp16 73 54.184.119.29, 443, 49704 AMAZON-02US United States 58->73 91 Writes to foreign memory regions 58->91 93 Allocates memory in foreign processes 58->93 95 Modifies the context of a thread in another process (thread injection) 58->95 97 2 other signatures 58->97 66 chrome.exe 1 58->66         started        signatures17 process18 dnsIp19 71 184.72.1.208, 443, 49709, 49710 AMAZON-02US United States 66->71
Threat name:
Win64.Trojan.Injuke
Status:
Malicious
First seen:
2021-03-29 19:12:08 UTC
AV detection:
5 of 29 (17.24%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
291c573996c647508544e8e21bd2764e6e4c834d53d6d2c8903a0001c783764b
MD5 hash:
efa4b2e7d7016a1f80efff5840de3a18
SHA1 hash:
04606786daa6313867c7ada1f0c9c925d9b602fb
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

BazarCall

Executable exe 291c573996c647508544e8e21bd2764e6e4c834d53d6d2c8903a0001c783764b

(this sample)

Comments