MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2a771b3df8f05f3872784c275c4e5fc9696eed8b418b1d774242b012e3d71048. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 13


Intelligence 13 IOCs YARA 7 File information Comments

SHA256 hash: 2a771b3df8f05f3872784c275c4e5fc9696eed8b418b1d774242b012e3d71048
SHA3-384 hash: 0bcd47a2bf09890e8001232e9a7063d32defe1b873418b3ee333e38d07f21add477a171bd128a607989c479762e77603
SHA1 hash: ed10b5e551613eec8cb8f06769b690c1d5d7c14c
MD5 hash: 86f30ad683a70ff7620f44746b09074c
humanhash: berlin-uncle-september-solar
File name:2a771b3df8f05f3872784c275c4e5fc9696eed8b418b1d774242b012e3d71048.exe
Download: download sample
File size:4'145'156 bytes
First seen:2025-04-03 14:34:18 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 73bcd0d3e95d7d74c27e71b6714faf5a
ssdeep 49152:V49pWsZc8H0Uji93xbOzghbq4TTow+lsghbyV8qXdTt/P9afxiMghbq4TTow+lsg:V0z+NCGhTWROV8qtx9aYhTWRH
TLSH T12516CF4C13A51947C42B277BEC2DCB3F84462ABD2AA3D6FA308235DFB5613D89146B74
TrID 56.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
11.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
9.0% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.1% (.EXE) Win32 Executable (generic) (4504/4/1)
3.7% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
dhash icon 526e32661e3a2a10
Reporter FelloBoiYuuka
Tags:exe selfmod trojan

Intelligence


File Origin
# of uploads :
1
# of downloads :
61
Origin country :
CA CA
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2a771b3df8f05f3872784c275c4e5fc9696eed8b418b1d774242b012e3d71048
Verdict:
Suspicious activity
Analysis date:
2025-04-02 21:33:28 UTC
Tags:
pastebin

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
shellcode glupteba kryptik virus
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Replacing executable files
Restart of the analyzed sample
DNS request
Connection attempt
Sending a custom TCP request
Moving of the original file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug fingerprint glupteba graftor overlay packed packed packer_detected razy
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
68 / 100
Signature
Connects to a pastebin service (likely for C&C)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1655715 Sample: rwgZSu7qD7.exe Startdate: 03/04/2025 Architecture: WINDOWS Score: 68 51 pastebin.com 2->51 55 Multi AV Scanner detection for submitted file 2->55 57 PE file contains section with special chars 2->57 59 PE file has a writeable .text section 2->59 8 rwgZSu7qD7.exe 3 2->8         started        signatures3 61 Connects to a pastebin service (likely for C&C) 51->61 process4 file5 43 C:\Users\user\Desktop\rwgZSu7qD7.exe, PE32 8->43 dropped 45 C:\Users\user\...\old_rwgZSu7qD7.exe (copy), PE32 8->45 dropped 47 C:\Users\...\rwgZSu7qD7.exe:Zone.Identifier, ASCII 8->47 dropped 63 Detected unpacking (overwrites its own PE header) 8->63 12 rwgZSu7qD7.exe 14 8->12         started        15 WerFault.exe 19 16 8->15         started        18 conhost.exe 8->18         started        signatures6 process7 dnsIp8 53 pastebin.com 104.22.68.199, 443, 49706 CLOUDFLARENETUS United States 12->53 20 WerFault.exe 16 12->20         started        23 WerFault.exe 16 12->23         started        25 WerFault.exe 16 12->25         started        27 4 other processes 12->27 49 C:\ProgramData\Microsoft\...\Report.wer, Unicode 15->49 dropped file9 process10 file11 29 C:\ProgramData\Microsoft\...\Report.wer, Unicode 20->29 dropped 31 C:\ProgramData\Microsoft\...\Report.wer, Unicode 23->31 dropped 33 C:\ProgramData\Microsoft\...\Report.wer, Unicode 25->33 dropped 35 C:\ProgramData\Microsoft\...\Report.wer, Unicode 27->35 dropped 37 C:\ProgramData\Microsoft\...\Report.wer, Unicode 27->37 dropped 39 C:\ProgramData\Microsoft\...\Report.wer, Unicode 27->39 dropped 41 C:\ProgramData\Microsoft\...\Report.wer, Unicode 27->41 dropped
Threat name:
Win32.Trojan.Glupteba
Status:
Malicious
First seen:
2021-04-14 07:25:00 UTC
File Type:
PE (Exe)
Extracted files:
55
AV detection:
33 of 36 (91.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
Legitimate hosting services abused for malware hosting/C2
Deletes itself
Executes dropped EXE
Verdict:
Malicious
Tags:
Win.Packed.Razy-9785185-0
YARA:
n/a
Unpacked files
SH256 hash:
3c404125ecc8339e59d878002029a77afe667a5ff029130f5d9e2befc5d373fc
MD5 hash:
31414a369f456f5ca051a17e31599719
SHA1 hash:
779ccc9f5c206fd357b64e4695a1c8b68be3d7a3
SH256 hash:
7a43fcb135f0c489907ccb09705c3f020a5d6e684e513add1bfae20378d3dcc0
MD5 hash:
ff4397b6ffff685e480a7eb2b935f74d
SHA1 hash:
8c287e926b9dea055d623a54a0676704a2c3d67e
SH256 hash:
3df1745b0b82fbff0026db052aa5eea8ab1c199c74028e04e8468929e0ef403c
MD5 hash:
97c0eb8c178b22c91c208741f2ce9a18
SHA1 hash:
b8c9ea64b053b28266af41086be165d6dcfade8b
SH256 hash:
084dc3d4ce80c0e5b45b64eb5b021cc855f2b9238aa4fb974cfa013b1149685b
MD5 hash:
576d3e67f0ab4474078dc507b7cd387f
SHA1 hash:
f00e87186d4a30e91dfdb1fdb06c72af592af84b
SH256 hash:
2a771b3df8f05f3872784c275c4e5fc9696eed8b418b1d774242b012e3d71048
MD5 hash:
86f30ad683a70ff7620f44746b09074c
SHA1 hash:
ed10b5e551613eec8cb8f06769b690c1d5d7c14c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_SUSPICIOUS_EXE_RawPaste_URL
Author:ditekSHen
Description:Detects executables (downlaoders) containing URLs to raw contents of a paste
Rule name:pe_detect_tls_callbacks
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:SUSP_Websites
Author:SECUINFRA Falcon Team
Description:Detects the reference of suspicious sites that might be used to download further malware
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:Windows_Generic_Threat_fca7f863
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
CHECK_TRUST_INFORequires Elevated Execution (level:requireAdministrator)high
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CreateProcessA
kernel32.dll::CloseHandle
kernel32.dll::CreateThread
WIN_BASE_APIUses Win Base APIkernel32.dll::TerminateProcess
kernel32.dll::LoadLibraryA
kernel32.dll::GetStartupInfoA
kernel32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programskernel32.dll::GetConsoleMode
kernel32.dll::GetConsoleOutputCP
kernel32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create Fileskernel32.dll::CopyFileA
kernel32.dll::CreateFileW
kernel32.dll::DeleteFileW
kernel32.dll::MoveFileW
kernel32.dll::GetWindowsDirectoryA
kernel32.dll::GetFileAttributesW

Comments