MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2d5f86c5aea887418198a76538412499bbc1d000f633de6d613f32c82c7c5073. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Worm.Ramnit


Vendor detections: 14


Intelligence 14 IOCs YARA File information Comments

SHA256 hash: 2d5f86c5aea887418198a76538412499bbc1d000f633de6d613f32c82c7c5073
SHA3-384 hash: 8f18883f44794fa769986d6d673ee8c97a88490606b20a303cc46266700cf410ebcc8836fb31b574fe262710a9897746
SHA1 hash: c050a5511b5544866d2380795fc49ef9c266ff7f
MD5 hash: cb6eb66d23af5e1c658f11e2c881c67b
humanhash: washington-carbon-tennis-sweet
File name:svchost.exe
Download: download sample
Signature Worm.Ramnit
File size:135'681 bytes
First seen:2022-08-23 14:10:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7197d8f25970cc6df2d2b302df40eb11 (2 x Worm.Ramnit)
ssdeep 1536:zOC0FvV4OguHxjhpA4Bm7uW0vSUsghQevBFkutIbgTuFqKRr0aF5frleGhd9TfBi:zwV4OgSzBmh04eZFkz3Rr0gwGj9Tf8
Threatray 39 similar samples on MalwareBazaar
TLSH T16AD3E1447F11EA76C6291C32A627CED40391AC668C422B834A677F1FFEB71B35917D09
TrID 38.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
15.5% (.EXE) OS/2 Executable (generic) (2029/13)
15.4% (.EXE) Clipper DOS Executable (2018/12)
15.2% (.EXE) Generic Win/DOS Executable (2002/3)
15.2% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon e1c47c9edecc7c1e (2 x Worm.Ramnit)
Reporter r3dbU7z
Tags:exe ramnit Worm.Ramnit

Intelligence


File Origin
# of uploads :
1
# of downloads :
395
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
svchost.exe
Verdict:
Malicious activity
Analysis date:
2022-08-23 14:13:22 UTC
Tags:
trojan ramnit

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Creating a file
Delayed writing of the file
Searching for the window
Launching a service
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
bamital lockscreen overlay packed ramnit virus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
68 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected Ramnit
Behaviour
Behavior Graph:
Threat name:
Win32.Worm.Ramnit
Status:
Malicious
First seen:
2022-08-23 14:11:07 UTC
File Type:
PE (Exe)
Extracted files:
51
AV detection:
26 of 26 (100.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Program crash
UPX packed file
Unpacked files
SH256 hash:
7eb6c533ded8bcb4ed3c95ae9afa7f18f07a33e3be9c0d4af3fb164721603c72
MD5 hash:
68454c64f4f6edd0f895bf1d30fd9fe5
SHA1 hash:
4a0fc2d4ab96e954356e7e5bf47ac98445482843
SH256 hash:
2d5f86c5aea887418198a76538412499bbc1d000f633de6d613f32c82c7c5073
MD5 hash:
cb6eb66d23af5e1c658f11e2c881c67b
SHA1 hash:
c050a5511b5544866d2380795fc49ef9c266ff7f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Worm.Ramnit

Executable exe 2d5f86c5aea887418198a76538412499bbc1d000f633de6d613f32c82c7c5073

(this sample)

  
Delivery method
Distributed via web download

Comments