MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2d0e112a742f88579d78f0a2feab230d56bc2d4e5c8b07ec4fa5ef45f482b11a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 2d0e112a742f88579d78f0a2feab230d56bc2d4e5c8b07ec4fa5ef45f482b11a
SHA3-384 hash: 365a33e90ad9a23493eb8a05cd109b9d57d26f4dfe9fdab772d56c34f50c9b9dcea7bfb8ecd9f7a834afc3e472be0214
SHA1 hash: 64e717e33ad9d590aafad09f137f8555c679f900
MD5 hash: 3e444097a710ba080d921004e26ae08a
humanhash: nineteen-social-quebec-nitrogen
File name:79slKbtScvtwoCirw.bin
Download: download sample
File size:655'872 bytes
First seen:2020-07-20 10:57:47 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:718oLV1q9I6/kVdSCZxRJDycod+ik4g8ylSoDCecckx7YS:jLVuaWYrE3oDgV
Threatray 29 similar samples on MalwareBazaar
TLSH F3D4BFC83B40944EC59E1EBA4E52CD708320AD46F6F7E34727C66EDE297E39BC905291
Reporter JAMESWT_WT

Intelligence


File Origin
# of uploads :
1
# of downloads :
69
Origin country :
n/a
Vendor Threat Intelligence
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
80 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 248079 Sample: 79slKbtScvtwoCirw.bin Startdate: 21/07/2020 Architecture: WINDOWS Score: 80 31 Antivirus / Scanner detection for submitted sample 2->31 33 Multi AV Scanner detection for submitted file 2->33 35 Machine Learning detection for sample 2->35 6 79slKbtScvtwoCirw.exe 2 2->6         started        9 79slKbtScvtwoCirw.exe 3 2->9         started        12 79slKbtScvtwoCirw.exe 2 2->12         started        process3 file4 37 Antivirus detection for dropped file 6->37 39 Multi AV Scanner detection for dropped file 6->39 41 Machine Learning detection for dropped file 6->41 14 79slKbtScvtwoCirw.exe 2 6->14         started        29 C:\Users\user\...\79slKbtScvtwoCirw.exe.log, ASCII 9->29 dropped 16 79slKbtScvtwoCirw.exe 1 4 9->16         started        19 79slKbtScvtwoCirw.exe 2 12->19         started        21 79slKbtScvtwoCirw.exe 12->21         started        23 79slKbtScvtwoCirw.exe 12->23         started        signatures5 process6 file7 25 C:\Users\user\...\79slKbtScvtwoCirw.exe, PE32 16->25 dropped 27 C:\...\79slKbtScvtwoCirw.exe:Zone.Identifier, ASCII 16->27 dropped
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-07-20 10:59:02 UTC
File Type:
PE (.Net Exe)
Extracted files:
3
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
persistence
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious use of WriteProcessMemory
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Adds Run key to start application
Adds Run key to start application
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 2d0e112a742f88579d78f0a2feab230d56bc2d4e5c8b07ec4fa5ef45f482b11a

(this sample)

  
Delivery method
Distributed via web download

Comments