MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 295793118d4462f9f7ad55212db1af810090028dc8e6cc3bb51a6715648b1639. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 295793118d4462f9f7ad55212db1af810090028dc8e6cc3bb51a6715648b1639
SHA3-384 hash: 3d1487d33623542a6235feaedf522d3ab31ef909f8578e255cb460b3f404771637471c442c1ccd60699db6fb73b4ebac
SHA1 hash: 6ea3f1f232e9cd519b5f4c8c6f673b5351f898dd
MD5 hash: a3d518b739834dc630664e0515a7f115
humanhash: pennsylvania-nineteen-single-butter
File name:a3d518b739834dc630664e0515a7f115
Download: download sample
File size:212'992 bytes
First seen:2020-11-17 15:25:24 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 03ae0108c7455c49c94d2d60afa1e57a (1 x Worm.Ramnit)
ssdeep 3072:9CQW+MPepkIe0klVKOq5jqlIKRrRi5DbJhFxXaNa/sqB3VZ4pLthEjQT6j:9Q4ITlVK75jqlvRVgbJhDaQ/NBFZkEj1
Threatray 187 similar samples on MalwareBazaar
TLSH 9F248D20F5D19201C1D72E36CDEDC5E82A93BE12B7A1D12BF859376F6872625CEC0B52
Reporter seifreed

Intelligence


File Origin
# of uploads :
1
# of downloads :
56
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the Windows subdirectories
Running batch commands
Creating a process with a hidden window
Launching the default Windows debugger (dwwin.exe)
Creating a process from a recently created file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Aenjaris
Status:
Malicious
First seen:
2020-11-07 15:03:35 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Program crash
Drops file in Windows directory
Drops file in System32 directory
Loads dropped DLL
Executes dropped EXE
ServiceHost packer
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
295793118d4462f9f7ad55212db1af810090028dc8e6cc3bb51a6715648b1639
MD5 hash:
a3d518b739834dc630664e0515a7f115
SHA1 hash:
6ea3f1f232e9cd519b5f4c8c6f673b5351f898dd
SH256 hash:
78695f81be66851d5410680d41a40a87f2b4d65882bc1bdb08d65079c4e39202
MD5 hash:
e460dbdd02c59948329c84f848bc1df5
SHA1 hash:
83bf333ada41f364246f6953ddb1daa63e0e60bf
SH256 hash:
ec43f38db3ee6a3fd60fcb8824b5386629b777ba0dcec2e806fa962f383f05da
MD5 hash:
11db23c7836c0a7f754faa6a3534a507
SHA1 hash:
dd379bef7cbc79fa43ec144fbf032afd943ae674
SH256 hash:
51364a3c3b8c1a971166d505487b6f2fcd1376172533db2a27497c1bdd07d326
MD5 hash:
2bd9384eccc90abc8e221e584b2fed88
SHA1 hash:
33d0cc2da7df5c57a5fa004206a63dd3cd957ce4
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments