MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 33992fbd53fb09845c617bc1c51bb31232a6ab2248ecad154d29930cde60862d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Zyklon


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments

SHA256 hash: 33992fbd53fb09845c617bc1c51bb31232a6ab2248ecad154d29930cde60862d
SHA3-384 hash: 62ea567a49188a694f6d1105604bc85a27130cbeef620b83cd1832df90bfea2648bee4bb7ab15b799c6b39fa2e59f961
SHA1 hash: 58a0f2faf597f89c897df4de7f4ee2107b170caf
MD5 hash: 8fdf5b8b20c4cc19c51c6f66ddd7985d
humanhash: butter-wisconsin-alabama-video
File name:8FDF5B8B20C4CC19C51C6F66DDD7985D
Download: download sample
Signature Zyklon
File size:5'589'544 bytes
First seen:2022-11-30 15:22:56 UTC
Last seen:2022-11-30 16:42:38 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4f67aeda01a0484282e8c59006b0b352 (51 x GuLoader, 9 x RemcosRAT, 9 x VIPKeylogger)
ssdeep 98304:En4rfLXKb+JvGZ0g0y9XaDJxgDXRNim7xpw0kK/lHqwePX9pvcYsVX3k4LjtWVTK:NbL8QGZ0g0y9qfOnz7xpkKppeuX3Vfnd
Threatray 1'535 similar samples on MalwareBazaar
TLSH T1EE463358A6447E52DD2A7FF270F78E08DEAA7DB96630B04F127971126A37527EC0360C
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 0e0f333333330f0c (1 x Zyklon)
Reporter rabbit84061341
Tags:exe signed Zyklon

Code Signing Certificate

Organisation:Shieldapps
Issuer:Symantec Class 3 SHA256 Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:2016-07-08T00:00:00Z
Valid to:2017-09-06T23:59:59Z
Serial number: 2125f865794b8c1d436695d5b25cfeb8
Thumbprint Algorithm:SHA256
Thumbprint: e673a434c70f92e00262de5a06f11df4eb578b3f66ecc63c0419102e4cbb1a64
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
97
Origin country :
SG SG
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
8FDF5B8B20C4CC19C51C6F66DDD7985D
Verdict:
Malicious activity
Analysis date:
2022-11-30 23:09:17 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a file
Сreating synchronization primitives
Creating a process from a recently created file
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Sending a custom TCP request
Creating a window
Creating a file in the Program Files subdirectories
Creating a file in the %AppData% subdirectories
Creating a service
Modifying a system file
DNS request
Connecting to a non-recommended domain
Sending an HTTP POST request
Sending an HTTP GET request
Launching a service
Searching for synchronization primitives
Blocking the Windows Defender launch
Enabling autorun for a service
Unauthorized injection to a recently created process
Enabling autorun by creating a file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
buer overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
GuLoader
Detection:
malicious
Classification:
rans.evad.troj
Score:
69 / 100
Signature
Installs Task Scheduler Managed Wrapper
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected GuLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 757810 Sample: PmRXFyOFkf.exe Startdate: 01/12/2022 Architecture: WINDOWS Score: 69 38 rd.verifytech.info 2->38 40 x.bidswitch.net 2->40 42 51 other IPs or domains 2->42 56 Snort IDS alert for network traffic 2->56 58 Multi AV Scanner detection for dropped file 2->58 60 Multi AV Scanner detection for submitted file 2->60 62 5 other signatures 2->62 8 PmRXFyOFkf.exe 18 120 2->8         started        12 Toaster.exe 2->12         started        15 UpdaterSvc.exe 2->15         started        17 5 other processes 2->17 signatures3 process4 dnsIp5 30 C:\Users\user\AppData\Local\...\StdUtils.dll, PE32 8->30 dropped 32 C:\Program Files (x86)\...\updater.exe, PE32 8->32 dropped 34 C:\Program Files (x86)\...\uninstall.exe, PE32 8->34 dropped 36 64 other files (57 malicious) 8->36 dropped 64 Installs Task Scheduler Managed Wrapper 8->64 19 InstCtrl.exe 15 17 8->19         started        22 InstCtrl.exe 8->22         started        24 InstCtrl.exe 8->24         started        26 11 other processes 8->26 54 ransomwaredefender.shieldapps.ml 12->54 file6 signatures7 process8 dnsIp9 44 shieldantivirus.shieldapps.ml 37.97.173.64, 49699, 49701, 49703 TRANSIP-ASAmsterdamtheNetherlandsNL Netherlands 19->44 46 192.99.17.241, 49700, 49702, 80 OVHFR Canada 19->46 48 192.168.2.1 unknown unknown 22->48 50 ransomwaredefender.shieldapps.ml 22->50 52 ransomwaredefender.shieldapps.ml 24->52 28 conhost.exe 26->28         started        process10
Threat name:
Win32.Rogue.PcCleaner
Status:
Malicious
First seen:
2019-09-26 01:40:45 UTC
File Type:
PE (Exe)
Extracted files:
985
AV detection:
7 of 27 (25.93%)
Threat level:
  4/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery persistence spyware stealer
Behaviour
Enumerates system info in registry
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Unpacked files
SH256 hash:
ef57f43c1ec13e1aa25bcb11982ed5a030d733654aae41c78881559ac090a8b6
MD5 hash:
66ccbf02dd9f9dc161ff98aeb105ad2c
SHA1 hash:
021c1a317301f1d40b9920c613fbe60b9232d3a1
SH256 hash:
5520208a33e6409c129b4ea1270771f741d95afe5b048c2a1e6a2cc2ad829934
MD5 hash:
92ec4dd8c0ddd8c4305ae1684ab65fb0
SHA1 hash:
d850013d582a62e502942f0dd282cc0c29c4310e
SH256 hash:
2f153b5537354346d962877d5cdd91338932286ee7172cf6146f9b072b5fa97d
MD5 hash:
2d1a19a864ab5f54c7c54988df171d05
SHA1 hash:
c44104e381d4ff9b56774ef2d6d9395ce4fb5733
SH256 hash:
8a6c4acfd9a278eccca63f3a6026161e7f1bee685290b3f09dc258425445a6d7
MD5 hash:
a32d3f6ab1f4667443cab44cb68953ad
SHA1 hash:
bd251aeef716cb85fdd4de852b2b80b3eb338458
SH256 hash:
681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
MD5 hash:
2ae993a2ffec0c137eb51c8832691bcb
SHA1 hash:
98e0b37b7c14890f8a599f35678af5e9435906e1
SH256 hash:
dc86f1111453a98fec572ce3a8b0843c1af1611134139b10a8522d523c308bbc
MD5 hash:
37e320b2445945c8347267276f1aa424
SHA1 hash:
9037dfce9df0a8f01fc3a6ed60a4682c792ce3f2
SH256 hash:
0c41778db13b9fe4e60814b924f68439f32d217f32984fee45726ad9546fdef7
MD5 hash:
4ea6c16c53fce819b69a5677b75ebadc
SHA1 hash:
8788998cc3aa8b1189a1a18e1147b99be17c18a6
SH256 hash:
3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
MD5 hash:
b648c78981c02c434d6a04d4422a6198
SHA1 hash:
74d99eed1eae76c7f43454c01cdb7030e5772fc2
Detections:
win_flawedammyy_auto
Parent samples :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 hash:
2ba36a89fa8771737865eb0975c843ffbe89d2a9d26e0c8a1f56aa378f2db453
MD5 hash:
1971a64a49edaa7d47d6e0ef67dd1691
SHA1 hash:
67af12bdf298f6b837bf6f87086e034cdf12cfc0
SH256 hash:
1d3dff25b8ab6a2cb91edb67a014db25d27bccf95adc12e274322058dff65943
MD5 hash:
2d53d6d37ae4973900520368813409f2
SHA1 hash:
5b6a7f7f0c5ec5c3490a81516a615fb1dcd20e09
SH256 hash:
8717e451286278ba07a15197f0292de2fd90487a9f78ad00b28f5d6b6ea2c8c9
MD5 hash:
9be4857761626998d1522c623058b2d0
SHA1 hash:
054c7d13400117f8b4accc2cba2bca5f976baa70
SH256 hash:
88c0cb3f0b0633bb21184e1b6a9c48ca45e544922de2f73e3089538ca1180b79
MD5 hash:
da9405294ee33017a48eb728347dd68d
SHA1 hash:
639a44069006281abe7a5c9ede2a96d9abc0b18b
Detections:
win_flawedammyy_auto
Parent samples :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 hash:
33992fbd53fb09845c617bc1c51bb31232a6ab2248ecad154d29930cde60862d
MD5 hash:
8fdf5b8b20c4cc19c51c6f66ddd7985d
SHA1 hash:
58a0f2faf597f89c897df4de7f4ee2107b170caf
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Ins_NSIS_Buer_Nov_2020_1
Author:Arkbird_SOLG
Description:Detect NSIS installer used for Buer loader

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments