MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2eede34adc2a44e96acfdfb9f3dfba2df4ad17f9fdf76970ad02d5596c1a50a5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 2 File information Comments

SHA256 hash: 2eede34adc2a44e96acfdfb9f3dfba2df4ad17f9fdf76970ad02d5596c1a50a5
SHA3-384 hash: 07d104cb518e9ccc0572b5a2475029c988fb9bdbbeb4e9f9326046705f15a3f0e7098f4ce4df10b37eb66429fd54a846
SHA1 hash: e49ce0c24276711c25a8ec2806d254ca1009a9a5
MD5 hash: 5a5fc342145370818aabfd363234f162
humanhash: delaware-leopard-one-nuts
File name:PYT_win_vers_1.170.msi
Download: download sample
File size:1'089'536 bytes
First seen:2023-08-14 20:03:12 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 24576:4tncpVGPzY5GQgZVlmh0XxdhE2PCCuvw9Iwoz2k1o6X7FF7TlUmLWOp9K68:RpUPzTQgZzC2P90i22upX7djLT
Threatray 83 similar samples on MalwareBazaar
TLSH T11E3512513AC9C531E39B1A3281AACB762579BC761B20D0CFB7907D6C5E307E2AD78352
TrID 98.2% (.MSI) Microsoft Windows Installer (454500/1/170)
1.7% (.) Generic OLE2 / Multistream Compound (8000/1)
Reporter Anonymous
Tags:msi signed

Code Signing Certificate

Organisation:PFO GROUP LLC
Issuer:GlobalSign GCC R45 EV CodeSigning CA 2020
Algorithm:sha256WithRSAEncryption
Valid from:2023-06-30T13:53:04Z
Valid to:2024-06-30T13:53:04Z
Serial number: 4ff7ae126e7a81a34c34b13d
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: ae65d943692b68895cfaf5dbffa02fa696d5fd6fb7f4f96274717d83ebeb5225
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
96
Origin country :
US US
Vendor Threat Intelligence
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Darkgate
Detection:
malicious
Classification:
troj.spyw.evad
Score:
92 / 100
Signature
Antivirus detection for URL or domain
Contains functionality to modify clipboard data
Creates a thread in another existing process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Darkgate
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1291158 Sample: PYT_win_vers_1.170.msi Startdate: 14/08/2023 Architecture: WINDOWS Score: 92 68 Multi AV Scanner detection for domain / URL 2->68 70 Antivirus detection for URL or domain 2->70 72 Multi AV Scanner detection for submitted file 2->72 74 4 other signatures 2->74 12 msiexec.exe 10 17 2->12         started        15 msiexec.exe 3 2->15         started        process3 file4 60 C:\Windows\Installer\MSI4AC7.tmp, PE32 12->60 dropped 62 C:\Windows\Installer\MSI1883.tmp, PE32 12->62 dropped 17 msiexec.exe 5 12->17         started        process5 process6 19 autoit.exe 6 17->19         started        22 expand.exe 5 17->22         started        25 icacls.exe 17->25         started        27 icacls.exe 17->27         started        file7 76 Contains functionality to modify clipboard data 19->76 29 cmd.exe 1 19->29         started        56 C:\Users\user\AppData\...\autoit.exe (copy), PE32 22->56 dropped 58 C:\...\1b99dc9f054860439e420a4afb737217.tmp, PE32 22->58 dropped signatures8 process9 dnsIp10 64 80.66.88.145, 2844, 49171, 49172 RISS-ASRU Russian Federation 29->64 78 Creates a thread in another existing process (thread injection) 29->78 33 AdobeARMHelper.exe 29->33         started        36 MyProg.exe 29->36         started        signatures11 process12 signatures13 66 Creates a thread in another existing process (thread injection) 33->66 38 Wkconv.exe 36->38         started        40 ADelRCP.exe 36->40         started        42 mip.exe 36->42         started        44 3 other processes 36->44 process14 process15 46 AcroTextExtractor.exe 38->46         started        48 msinfo32.exe 38->48         started        50 ADelRCP.exe 38->50         started        52 3 other processes 38->52 process16 54 RdrServicesUpdater.exe 46->54         started       
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2023-08-08 09:25:04 UTC
File Type:
Binary (Archive)
Extracted files:
58
AV detection:
4 of 24 (16.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery
Behaviour
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Enumerates connected drives
Drops startup file
Executes dropped EXE
Loads dropped DLL
Modifies file permissions
Blocklisted process makes network request
Suspicious use of NtCreateUserProcessOtherParentProcess
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_OLE_file_magic_number
Author:Didier Stevens (https://DidierStevens.com)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via e-mail link

Comments