MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2edd50e73abfabbc07a4cd42490d8f6d6e800a2663382f37762410b82850e93a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cosmu


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 2edd50e73abfabbc07a4cd42490d8f6d6e800a2663382f37762410b82850e93a
SHA3-384 hash: d4f333e198900182e1a2b2f4b7ff205afbbf0698aa2a21361122a96d067e838480efd358ffe9e566be61795a44bcc150
SHA1 hash: 0bef4f6c135fbf88a0d0ab14700aedf3099b0ddc
MD5 hash: d3f0188a3b5ed5252fe8b6b74c57c7f0
humanhash: summer-mike-maine-fruit
File name:virussign.com_d3f0188a3b5ed5252fe8b6b74c57c7f0
Download: download sample
Signature Cosmu
File size:197'456 bytes
First seen:2022-07-13 14:28:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 8abecba2211e61763c4c9ffcaa13369e (172 x Cosmu, 1 x Zombie, 1 x CobaltStrike)
ssdeep 3072:62ssWpwXGkR2SfXGkR2S0ygxs3NIx48EpKZFdgrU2ssWpwXGkR2SfXGkR2S0ygxx:MVBvxs9IxqpKVBvxs9IxqpW
Threatray 14 similar samples on MalwareBazaar
TLSH T190148E1EAE2750E4D626B138C5A6627B943775742670FEEFA3E0D4370D62A30317932B
TrID 44.6% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
23.6% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
9.4% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.4% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter KdssSupport
Tags:Cosmu exe


Avatar
KdssSupport
Uploaded with API

Intelligence


File Origin
# of uploads :
1
# of downloads :
147
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
virussign.com_d3f0188a3b5ed5252fe8b6b74c57c7f0
Verdict:
No threats detected
Analysis date:
2022-07-14 02:52:59 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the Windows subdirectories
Enabling the 'hidden' option for recently created files
Creating a file
Creating a process from a recently created file
Moving a recently created file
Modifying an executable file
Sending a custom TCP request
Infecting executable files
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed packed rat shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
adwa.evad
Score:
80 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Creates files in the recycle bin to hide itself
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files to the startup folder
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.Zombie
Status:
Malicious
First seen:
2022-07-07 02:00:13 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
25 of 26 (96.15%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Drops file in System32 directory
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
2edd50e73abfabbc07a4cd42490d8f6d6e800a2663382f37762410b82850e93a
MD5 hash:
d3f0188a3b5ed5252fe8b6b74c57c7f0
SHA1 hash:
0bef4f6c135fbf88a0d0ab14700aedf3099b0ddc
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Cosmu

Executable exe 2edd50e73abfabbc07a4cd42490d8f6d6e800a2663382f37762410b82850e93a

(this sample)

  
Delivery method
Distributed via web download

Comments