MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2d5f86c5aea887418198a76538412499bbc1d000f633de6d613f32c82c7c5073. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Worm.Ramnit
Vendor detections: 14
| SHA256 hash: | 2d5f86c5aea887418198a76538412499bbc1d000f633de6d613f32c82c7c5073 |
|---|---|
| SHA3-384 hash: | 8f18883f44794fa769986d6d673ee8c97a88490606b20a303cc46266700cf410ebcc8836fb31b574fe262710a9897746 |
| SHA1 hash: | c050a5511b5544866d2380795fc49ef9c266ff7f |
| MD5 hash: | cb6eb66d23af5e1c658f11e2c881c67b |
| humanhash: | washington-carbon-tennis-sweet |
| File name: | svchost.exe |
| Download: | download sample |
| Signature | Worm.Ramnit |
| File size: | 135'681 bytes |
| First seen: | 2022-08-23 14:10:13 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 7197d8f25970cc6df2d2b302df40eb11 (2 x Worm.Ramnit) |
| ssdeep | 1536:zOC0FvV4OguHxjhpA4Bm7uW0vSUsghQevBFkutIbgTuFqKRr0aF5frleGhd9TfBi:zwV4OgSzBmh04eZFkz3Rr0gwGj9Tf8 |
| Threatray | 39 similar samples on MalwareBazaar |
| TLSH | T16AD3E1447F11EA76C6291C32A627CED40391AC668C422B834A677F1FFEB71B35917D09 |
| TrID | 38.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 15.5% (.EXE) OS/2 Executable (generic) (2029/13) 15.4% (.EXE) Clipper DOS Executable (2018/12) 15.2% (.EXE) Generic Win/DOS Executable (2002/3) 15.2% (.EXE) DOS Executable Generic (2000/1) |
| File icon (PE): | |
| dhash icon | e1c47c9edecc7c1e (2 x Worm.Ramnit) |
| Reporter | |
| Tags: | exe ramnit Worm.Ramnit |
Intelligence
File Origin
# of uploads :
1
# of downloads :
395
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ramnit
ID:
1
File name:
svchost.exe
Verdict:
Malicious activity
Analysis date:
2022-08-23 14:13:22 UTC
Tags:
trojan ramnit
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Creating a file
Delayed writing of the file
Searching for the window
Launching a service
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
bamital lockscreen overlay packed ramnit virus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Ramnit
Verdict:
Malicious
Result
Threat name:
Ramnit
Detection:
malicious
Classification:
troj
Score:
68 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected Ramnit
Behaviour
Behavior Graph:
Detection:
ramnit
Threat name:
Win32.Worm.Ramnit
Status:
Malicious
First seen:
2022-08-23 14:11:07 UTC
File Type:
PE (Exe)
Extracted files:
51
AV detection:
26 of 26 (100.00%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 29 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
8/10
Tags:
upx
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Program crash
UPX packed file
Unpacked files
SH256 hash:
ffc9384268e7b83bce58e3e86e3b19f9689552679026bb2cfb9951bc3b40f07b
MD5 hash:
4469d96da242213b46e390c215df3d60
SHA1 hash:
699f475b95dae504cc902762b9c0f7315616c895
Detections:
win_ramnit_g0
win_ramnit_g1
win_ramnit_auto
Parent samples :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 hash:
04a1fe8e3d0f1112cd274b75559fea78fa9e873efb719001bd5480c4582799d0
MD5 hash:
fea9741cf5cb761ff4133120ded2176d
SHA1 hash:
25be4965f45af627f7477a45349e53b8d48a3509
Detections:
win_ramnit_g0
win_ramnit_auto
Parent samples :
d410461b6a41d5193c3920f152e2a263944ca330c11f3d306bc266281b93ce78
e08e0f0228a8e08b8330c46c01f7b185513be82682b41d031e86591d195f2e56
2f05200e09f38d2197fb48d265bcd4d050131f688ce51cf86478192df100d675
199533f77cb4331908a90346f24610888ef42d6dd2f9866b733752426702e737
33afd44ca2f375189b68c6ab3f410d45ae1547e20ae04ed5e4e3b36978fdba49
2aef6190fbec261019520c2e603024eb0abf68eaf2460b3ed7c03c14754e5a09
337463b61d271e4826a1c570e565fe58f42548247b20c9cc8d52e7342943606e
83d364c969b64ac72b8f8eb1e66d60c6915d10d385190d29ba6df82c67167f0b
4f0790556072df8347f13be4fe3068c743b7a7f0dcefa155b434d8c408ec8d35
b1e7478ebc4b374feb2964da15149281da610a4e5773b890b7c9cabb4469c29f
2d5f86c5aea887418198a76538412499bbc1d000f633de6d613f32c82c7c5073
52c970b575040b26c6c357f1aa64288544578a229b9be70acd0f860f55cca346
70f62aa60264ce150e290264a190270ec0a66c84452981ea4cbee8d2a427acca
06f7c12171e1608547eb5ae2d39af72835519fdf56aaaeb1dcc6be853dac22a9
75a0a12b779dc49dee1cb4e27eb6362bae2bbde60c9754b12aed27d7f0b6d129
270ea6a72a4f9ab032ce73bd2ba9e9a207929f0d4041e2cb298a650d4d2062ed
ba33ab723fdac923f508eed7114aba2a370c6b7ecd3639dc588cd8fc0c865f34
e08e0f0228a8e08b8330c46c01f7b185513be82682b41d031e86591d195f2e56
2f05200e09f38d2197fb48d265bcd4d050131f688ce51cf86478192df100d675
199533f77cb4331908a90346f24610888ef42d6dd2f9866b733752426702e737
33afd44ca2f375189b68c6ab3f410d45ae1547e20ae04ed5e4e3b36978fdba49
2aef6190fbec261019520c2e603024eb0abf68eaf2460b3ed7c03c14754e5a09
337463b61d271e4826a1c570e565fe58f42548247b20c9cc8d52e7342943606e
83d364c969b64ac72b8f8eb1e66d60c6915d10d385190d29ba6df82c67167f0b
4f0790556072df8347f13be4fe3068c743b7a7f0dcefa155b434d8c408ec8d35
b1e7478ebc4b374feb2964da15149281da610a4e5773b890b7c9cabb4469c29f
2d5f86c5aea887418198a76538412499bbc1d000f633de6d613f32c82c7c5073
52c970b575040b26c6c357f1aa64288544578a229b9be70acd0f860f55cca346
70f62aa60264ce150e290264a190270ec0a66c84452981ea4cbee8d2a427acca
06f7c12171e1608547eb5ae2d39af72835519fdf56aaaeb1dcc6be853dac22a9
75a0a12b779dc49dee1cb4e27eb6362bae2bbde60c9754b12aed27d7f0b6d129
270ea6a72a4f9ab032ce73bd2ba9e9a207929f0d4041e2cb298a650d4d2062ed
ba33ab723fdac923f508eed7114aba2a370c6b7ecd3639dc588cd8fc0c865f34
SH256 hash:
7eb6c533ded8bcb4ed3c95ae9afa7f18f07a33e3be9c0d4af3fb164721603c72
MD5 hash:
68454c64f4f6edd0f895bf1d30fd9fe5
SHA1 hash:
4a0fc2d4ab96e954356e7e5bf47ac98445482843
SH256 hash:
b79abc999d8b105b7b6bf7438c61a23e0cdbf5dc47ae88b609e278575f831627
MD5 hash:
85f162b97e62876c00b660567b9fc76b
SHA1 hash:
01301f63c895dd1d3caef46e405f8b259b1efb9d
Detections:
win_ramnit_g0
win_ramnit_g1
win_ramnit_auto
Parent samples :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 hash:
2d5f86c5aea887418198a76538412499bbc1d000f633de6d613f32c82c7c5073
MD5 hash:
cb6eb66d23af5e1c658f11e2c881c67b
SHA1 hash:
c050a5511b5544866d2380795fc49ef9c266ff7f
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.41
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.