MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 32f431ba791fcd1f53e53b26447c9dbf59983549f567bac43ea9578b98de4ca8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments 1

SHA256 hash: 32f431ba791fcd1f53e53b26447c9dbf59983549f567bac43ea9578b98de4ca8
SHA3-384 hash: 7ee68d90921804d990862636a69d7491819816d967236215ec27d826deff6b4ac25a5dab82f343746f707271127df0e9
SHA1 hash: e493be600aa8ecf7384ac3f23454daf6fdd1821d
MD5 hash: 732132623989caae367e0878298b7e9b
humanhash: wolfram-pluto-fruit-utah
File name:732132623989caae367e0878298b7e9b
Download: download sample
Signature n/a
File size:382'976 bytes
First seen:2022-05-05 03:37:16 UTC
Last seen:2022-05-05 04:32:24 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6155d4d1fe9d4982682a0787c78cb5b8 (4 x Stop, 2 x TeamBot, 1 x Smoke Loader)
ssdeep 6144:SOHGuNkVVlgz8djnAv3GsrCynHcyMHwLQ9zsF2RcS3+Xyiv+Y6itQ7VsS:SihyV368djA+spnHcyMQwSS3+B+QGVs
Threatray 7'669 similar samples on MalwareBazaar
TLSH T1DB84BE10BB90C034F5B761F48A76C3A8793EBDA19B2455CB62D43AEE66346E0EC31357
File icon (PE):PE icon
dhash icon c4e8e8e8e8e8f069
Reporter @zbetcheckin
Tags:32 exe trojan

Intelligence


File Origin
# of uploads :
2
# of downloads :
1'158
Origin country :
FR FR
Mail intelligence
No data
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
732132623989caae367e0878298b7e9b
Verdict:
Suspicious activity
Analysis date:
2022-05-05 03:39:05 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Searching for synchronization primitives
–°reating synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
Running batch commands
Creating a process with a hidden window
Launching a tool to kill processes
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionGetTickCount
CheckCmdLine
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
danabot greyware packed
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
60 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected Nymaim
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 620693 Sample: qjrOWCCE58 Startdate: 05/05/2022 Architecture: WINDOWS Score: 60 36 Multi AV Scanner detection for submitted file 2->36 38 Yara detected Nymaim 2->38 40 Machine Learning detection for sample 2->40 7 qjrOWCCE58.exe 1 2->7         started        process3 process4 9 WerFault.exe 9 7->9         started        12 WerFault.exe 9 7->12         started        14 WerFault.exe 9 7->14         started        16 5 other processes 7->16 file5 22 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 9->22 dropped 24 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 12->24 dropped 26 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 14->26 dropped 28 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 16->28 dropped 30 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 16->30 dropped 32 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 16->32 dropped 34 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 16->34 dropped 18 taskkill.exe 1 16->18         started        20 conhost.exe 16->20         started        process6
Threat name:
Win32.Trojan.CrypterX
Status:
Malicious
First seen:
2022-05-05 03:38:09 UTC
File Type:
PE (Exe)
Extracted files:
32
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Kills process with taskkill
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Checks computer location settings
Deletes itself
Unpacked files
SH256 hash:
2134686cff47d2a4ab1061f06fdd76d129143ed6a231044f4d970c55f401991d
MD5 hash:
4b3ec93df45d6728fc527559ebff6824
SHA1 hash:
f300a9ac24225b3452e6bd0f625aa331bc34e142
SH256 hash:
32f431ba791fcd1f53e53b26447c9dbf59983549f567bac43ea9578b98de4ca8
MD5 hash:
732132623989caae367e0878298b7e9b
SHA1 hash:
e493be600aa8ecf7384ac3f23454daf6fdd1821d

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 32f431ba791fcd1f53e53b26447c9dbf59983549f567bac43ea9578b98de4ca8

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-05-05 03:37:21 UTC

url : hxxp://2.58.149.159/load.php?pub=mixfive/