MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2d721df670fdb63c643b3de2dcdd46311b8d94d2753b47ad0035392644dee77a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Lu0Bot


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 2d721df670fdb63c643b3de2dcdd46311b8d94d2753b47ad0035392644dee77a
SHA3-384 hash: 70c61cf29741462d81c32bc5a3b5f208c19f5eb1ddc5198d67bd4e637f5f74ee557bc7a6631879ad4f728fe9f0033a22
SHA1 hash: 5da276eab60258a394cbb4bc2c3ff3570e202f5a
MD5 hash: 090ca6d0cf757ef15a469652e75c05d7
humanhash: princess-winner-lactose-crazy
File name:usfive_20211007-143832
Download: download sample
Signature Lu0Bot
File size:2'560 bytes
First seen:2021-10-07 13:40:29 UTC
Last seen:2021-10-07 15:09:50 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2e5a1176fc39ed148165dbe2da2bad74 (1 x Lu0Bot)
ssdeep 48:6jY/IjbcYCF+IBuVRdjMdxyC3tQ7lRvRvSlBS:b/1vuBAyCSf5vSlA
Threatray 6 similar samples on MalwareBazaar
TLSH T16D51DB3BA7B34FF2E229B377022BDB0536B5D430137750360B276179666ED6B4468B01
Reporter benkow_
Tags:exe Lu0Bot

Intelligence


File Origin
# of uploads :
2
# of downloads :
178
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
usfive_20211007-143832
Verdict:
Suspicious activity
Analysis date:
2021-10-07 13:41:30 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Launching a process
Creating a process with a hidden window
Creating a window
DNS request
Connection attempt
Sending an HTTP GET request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
67%
Tags:
packed
Result
Threat name:
Detection:
malicious
Classification:
spyw.evad
Score:
72 / 100
Signature
Downloads files via mshta.exe (likely to bypass HIPS)
Obfuscated command line found
Sigma detected: Mshta JavaScript Execution
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Suspicious MSHTA Process Patterns
Yara detected Lu0Bot
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 498845 Sample: usfive_20211007-143832 Startdate: 07/10/2021 Architecture: WINDOWS Score: 72 52 Yara detected Lu0Bot 2->52 54 Sigma detected: Mshta Spawning Windows Shell 2->54 56 Sigma detected: Mshta JavaScript Execution 2->56 58 2 other signatures 2->58 10 usfive_20211007-143832.exe 2->10         started        process3 signatures4 62 Downloads files via mshta.exe (likely to bypass HIPS) 10->62 13 mshta.exe 1 10->13         started        process5 dnsIp6 44 olo57.shop 31.214.157.112, 49717, 49731, 80 RACKPLACEDE Germany 13->44 64 Obfuscated command line found 13->64 17 cmd.exe 4 13->17         started        signatures7 process8 signatures9 50 Obfuscated command line found 17->50 20 cscript.exe 2 17->20         started        23 cscript.exe 2 17->23         started        26 expand.exe 8 17->26         started        29 conhost.exe 17->29         started        process10 dnsIp11 60 Obfuscated command line found 20->60 31 node.exe 3 20->31         started        42 olo57.shop 23->42 38 C:\ProgramData\DNTException\node.exe (copy), PE32 26->38 dropped 40 C:\...\cb4b3754e2719b438573f864d3b5bad6.tmp, PE32 26->40 dropped file12 signatures13 process14 dnsIp15 46 ran38.fun 104.244.79.125, 18223, 54155 PONYNETUS United States 31->46 48 ran38a.fun 31->48 34 conhost.exe 31->34         started        36 cmd.exe 31->36         started        process16
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-10-07 13:41:13 UTC
AV detection:
6 of 28 (21.43%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery
Behaviour
Checks processor information in registry
Enumerates processes with tasklist
Gathers network information
Gathers system information
NTFS ADS
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Enumerates physical storage devices
Drops file in Windows directory
Loads dropped DLL
Modifies file permissions
Blocklisted process makes network request
Executes dropped EXE
Unpacked files
SH256 hash:
2d721df670fdb63c643b3de2dcdd46311b8d94d2753b47ad0035392644dee77a
MD5 hash:
090ca6d0cf757ef15a469652e75c05d7
SHA1 hash:
5da276eab60258a394cbb4bc2c3ff3570e202f5a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
GCleaner

Comments