MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2cdac05088d51a5ebb646fbba3c305ec14c950dc1ce3b3d51da5aa6584774429. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stop
Vendor detections: 13
| SHA256 hash: | 2cdac05088d51a5ebb646fbba3c305ec14c950dc1ce3b3d51da5aa6584774429 |
|---|---|
| SHA3-384 hash: | 1b8171f492552aed0f9a14cb68e3b2839dc3c0dfb3bd6afb27465084713e80016a54e0f66c9e419ebf2f0e079c65021f |
| SHA1 hash: | 2c3b0d0bb498aa79a2015cdf017cc71308938615 |
| MD5 hash: | 0de530a44e9f577c99c3249e39eae99e |
| humanhash: | magazine-mango-six-utah |
| File name: | 2cdac05088d51a5ebb646fbba3c305ec14c950dc1ce3b3d51da5aa6584774429 |
| Download: | download sample |
| Signature | Stop |
| File size: | 788'480 bytes |
| First seen: | 2021-09-30 11:58:51 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 34179943afcc1a565eb1e642cfbb492c (1 x Amadey, 1 x Stop) |
| ssdeep | 24576:ScSK45CzOLbaG3xCux4+TM5ATT8WI1Cr:FSy2baG34uWMY |
| Threatray | 749 similar samples on MalwareBazaar |
| TLSH | T14AF41201F585E6B7C761817224D6C374EA2EFC6CDB60A6BA279053FF9E3D6908E06311 |
| File icon (PE): | |
| dhash icon | 4839b234e8c38890 (121 x RaccoonStealer, 54 x RedLineStealer, 51 x ArkeiStealer) |
| Reporter | |
| Tags: | exe Stop |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
23ef3edf3fc3bd322e8b1a4199c0b832c89b5f2d9fb0b218168110bad22c6bf5
ab9a2ac16788b95a8f0bd270cac235e4aaba83a1772396bc97fff0925e7c704c
2cdac05088d51a5ebb646fbba3c305ec14c950dc1ce3b3d51da5aa6584774429
30089a78356dd0f6801c73349dbcbdde0e5e8b6baed69a926066ddac97d9eea4
3d1185aaeb41f59249b8ceae636ec448697236455dacfb07fb8a3460ee17dab7
2cca6cadf1f67790d0234a75ec54a6670f0503e0283b223ca04a4b9e70e97576
5f577398b47d02dbb683a2ee2a32ffc49326f3874971791646fefdb02d6796f1
f7561de520f21434830d40d74904e93125b76407d477411622bbd829283ba8c4
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | MALWARE_Win_STOP |
|---|---|
| Author: | ditekSHen |
| Description: | Detects STOP ransomware |
| Rule name: | SUSP_XORed_URL_in_EXE |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | SUSP_XORed_URL_in_EXE_RID2E46 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | win_stop_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.stop. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.