MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2b911df18337cc69e42d8c16ab58856af2722c7618146a491c9efe54aa73fdbe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 2b911df18337cc69e42d8c16ab58856af2722c7618146a491c9efe54aa73fdbe
SHA3-384 hash: 606ec46f7e66e2d1758504f2026e832d66acd09df3e2ba9e2bd37541f0fb0f93bd8e246d106bd9230f129eb90d1dd890
SHA1 hash: beb9a2689b12f5efa50792409c7fb8e813e3c39d
MD5 hash: b9c6c88fefc90618d568ed4eab543558
humanhash: five-freddie-william-potato
File name:SecuriteInfo.com.Win32.GenKryptik.ELUY.3072
Download: download sample
File size:114'576 bytes
First seen:2020-06-04 13:31:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 80a8667e5efadfdd6dde3af4dc7eaf39
ssdeep 1536:Kxah2BYOVMsGZLt6WmFk1ZFVXz4HE7bhjXj:+aRa2HL7Ekxjz
Threatray 152 similar samples on MalwareBazaar
TLSH 7CB35A22B42CAEECF49F50719D801CF297D15DE2D911067F31FA7FA627F0E428A09996
Reporter SecuriteInfoCom

Code Signing Certificate

Organisation:CEKTEKWXYTETHOVVGW
Issuer:CEKTEKWXYTETHOVVGW
Algorithm:sha1WithRSA
Valid from:May 23 19:52:25 2020 GMT
Valid to:Dec 31 23:59:59 2039 GMT
Serial number: -2D702F2B6BFAB243B9A3ECB3219E078E
Thumbprint Algorithm:SHA256
Thumbprint: A6CF96DED5C43638804D44B0FF36B3419FCB3CF6371B464EF0E4A14FB7612AE5
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
69
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2020-06-04 10:55:13 UTC
File Type:
PE (Exe)
Extracted files:
25
AV detection:
25 of 28 (89.29%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader backdoor cryptone packer trojan
Behaviour
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of UnmapMainImage
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Deletes itself
Loads dropped DLL
Executes dropped EXE
CryptOne packer
SmokeLoader
Malware Config
C2 Extraction:
http://transvil2.xyz/index.php
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 2b911df18337cc69e42d8c16ab58856af2722c7618146a491c9efe54aa73fdbe

(this sample)

  
Delivery method
Distributed via web download

Comments