MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2b79b44b0f533dabe4d08cc0aed9139017ecf2571597ec816bdffbe8aea59107. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 2b79b44b0f533dabe4d08cc0aed9139017ecf2571597ec816bdffbe8aea59107
SHA3-384 hash: 29ad3161c8248407647fdbfcd0608ea9cab49f9a8a628c703110d671b0a7b13fa4334b0e068aafee3e6bfb49fbe5aa24
SHA1 hash: 3a4ed8e57d02c8312147b13b6153ec50dc0258a8
MD5 hash: 02c5dc235a3815ae32649ec6dec8b63d
humanhash: island-mirror-pluto-edward
File name:SecuriteInfo.com.W32.Agent.NNJU-2136.19553.21244
Download: download sample
File size:275'379 bytes
First seen:2023-12-13 15:21:28 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash deba71fcd4e68e93af678f2a5e291977
ssdeep 3072:0HDp7pRuKjsir5HZFQGrsUwF7hplPoutjgVp25skQ4qu/m1qocmjHwJ0fQh8cP:+RR5rhZFQGrsUwF7vlPoSM0Ou8JcUQ9P
TLSH T18844391A3DF4E873C00B4A318CB766BCB661B8614D428F4B26D6D71DEC3A1916E22D77
TrID 25.1% (.EXE) UPX compressed Win32 Executable (27066/9/6)
24.7% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4)
15.3% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
12.1% (.SCR) Windows screen saver (13097/50/3)
6.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
Reporter SecuriteInfoCom
Tags:dll

Intelligence


File Origin
# of uploads :
1
# of downloads :
308
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
89%
Tags:
control hook keylogger lolbin overlay packed packed packed shell32 upx
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
n/a
Detection:
suspicious
Classification:
n/a
Score:
27 / 100
Signature
Machine Learning detection for sample
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1361562 Sample: SecuriteInfo.com.W32.Agent.... Startdate: 13/12/2023 Architecture: WINDOWS Score: 27 28 Machine Learning detection for sample 2->28 8 loaddll32.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 rundll32.exe 8->12         started        14 rundll32.exe 1 8->14         started        16 25 other processes 8->16 process5 18 rundll32.exe 10->18         started        20 WerFault.exe 12->20         started        22 WerFault.exe 14->22         started        24 WerFault.exe 16->24         started        process6 26 WerFault.exe 18->26         started       
Verdict:
unknown
Result
Malware family:
n/a
Score:
  7/10
Tags:
upx
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Program crash
UPX packed file
Unpacked files
SH256 hash:
810aca5e424f1ab273494089476d0783fa6d676339da286fb06dc4a09aa55a8c
MD5 hash:
6e6f3d1804a8531b0636ad7cb555fa47
SHA1 hash:
967957d7ea1fc522de8a8f4575ab6a60272cc6d1
SH256 hash:
2b79b44b0f533dabe4d08cc0aed9139017ecf2571597ec816bdffbe8aea59107
MD5 hash:
02c5dc235a3815ae32649ec6dec8b63d
SHA1 hash:
3a4ed8e57d02c8312147b13b6153ec50dc0258a8
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments