MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 333b52c2cfac56b86ee9d54aef4f0ff4144528917bc1aa1fe1613efc2318339a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 333b52c2cfac56b86ee9d54aef4f0ff4144528917bc1aa1fe1613efc2318339a
SHA3-384 hash: 68ddf1f69f7c54505376ec3a17986a06421823ddad49dbe66795ab74c673ca9ff54cc94241573e9a96584fc28d6b185a
SHA1 hash: 7d92970e8394b20b887bf2de60408da15e260d9f
MD5 hash: 832415bba4378181e3c975f247b9d0e8
humanhash: beryllium-fifteen-uniform-spaghetti
File name:333b52c2cfac56b86ee9d54aef4f0ff4144528917bc1aa1fe1613efc2318339a
Download: download sample
File size:12'128 bytes
First seen:2021-11-07 20:51:38 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash f9ade0aa18f660a34a4fa23392e21838 (9 x DarkSide, 3 x BazaLoader, 2 x ShikataGaNai)
ssdeep 192:tzPQIZHPRNqK2KUcew7pgzDWpHT8NfH0JOqsmVgz28WhBqRdZlvks:dPQAEKRSqgzDGE8JN77hhOZl7
TLSH T1D6423B9B06391412EE478F7671C4E22B4D76B7C926D1C0DF843DD1928FC1B913AAA1AE
Reporter BushidoToken
Tags:apt APT27 Cheetah Mobile Inc. dll HyperBro

Intelligence


File Origin
# of uploads :
1
# of downloads :
184
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
60 / 100
Signature
Found detection on Joe Sandbox Cloud Basic with higher score
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 517347 Sample: 67esCSaXNE.dll Startdate: 07/11/2021 Architecture: WINDOWS Score: 60 23 Multi AV Scanner detection for submitted file 2->23 25 Found detection on Joe Sandbox Cloud Basic with higher score 2->25 27 PE file has a writeable .text section 2->27 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        13 rundll32.exe 7->13         started        15 6 other processes 7->15 process5 17 rundll32.exe 9->17         started        19 WerFault.exe 23 9 11->19         started        21 WerFault.exe 2 9 13->21         started       
Threat name:
Win32.Trojan.DllHijack
Status:
Malicious
First seen:
2021-09-16 16:30:37 UTC
AV detection:
8 of 26 (30.77%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
333b52c2cfac56b86ee9d54aef4f0ff4144528917bc1aa1fe1613efc2318339a
MD5 hash:
832415bba4378181e3c975f247b9d0e8
SHA1 hash:
7d92970e8394b20b887bf2de60408da15e260d9f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments