MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 342117d5786f6c02c86671fc05a1d7b86f8c20c7543c9ea2ea1cf7f3b56f82b0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Arechclient2


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: 342117d5786f6c02c86671fc05a1d7b86f8c20c7543c9ea2ea1cf7f3b56f82b0
SHA3-384 hash: 98308fe7dc0f92e53bfcbcf3552e3bd9261eff2a29978afe26462e55cc02e0d5be18cbb3640b711eba0794ee7040d1ea
SHA1 hash: 2ca97bf54a468f4cb5c83b679a16daf0c7f9530f
MD5 hash: b33b2c6c7073518f674f74dd19bc536f
humanhash: pennsylvania-uranus-friend-bravo
File name:95.msi
Download: download sample
Signature Arechclient2
File size:4'800'512 bytes
First seen:2025-03-04 17:06:27 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 98304:mXsHKnfqx6vUd/3rVa0UPBtyCBMJpFIkX+6aMSjptxCqFwPon6OQQFEq:0k6fqkUtJUPBY8MJfnO60jpuqCP8xQlq
TLSH T15026339631E0CE30D10EFD75950129CD91016C1983EBAABF20B5F1AE7BB2DB41678A5F
TrID 88.4% (.MST) Windows SDK Setup Transform script (61000/1/5)
11.5% (.) Generic OLE2 / Multistream Compound (8000/1)
Magika msi
Reporter 1ZRR4H
Tags:Arechclient2 msi

Intelligence


File Origin
# of uploads :
1
# of downloads :
103
Origin country :
CL CL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
81.4%
Tags:
shellcode spawn html
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
installer wix
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Connects to many ports of the same IP (likely port scanning)
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
PE file has a writeable .text section
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1629426 Sample: 95.msi Startdate: 04/03/2025 Architecture: WINDOWS Score: 100 114 undermymindops.com 2->114 116 shed.dual-low.s-part-0032.t-0009.t-msedge.net 2->116 118 8 other IPs or domains 2->118 134 Suricata IDS alerts for network traffic 2->134 136 Malicious sample detected (through community Yara rule) 2->136 138 Antivirus detection for URL or domain 2->138 140 6 other signatures 2->140 12 msiexec.exe 80 40 2->12         started        15 SplashWin.exe 1 2->15         started        18 msedge.exe 2->18         started        21 msiexec.exe 3 2->21         started        signatures3 process4 dnsIp5 106 C:\Users\user\AppData\Local\...\SplashWin.exe, PE32 12->106 dropped 108 C:\Users\user\AppData\...\vcruntime140.dll, PE32 12->108 dropped 110 C:\Users\user\AppData\Local\...\msvcp140.dll, PE32 12->110 dropped 112 C:\Users\user\AppData\Local\...\DuiLib_u.dll, PE32 12->112 dropped 23 SplashWin.exe 7 12->23         started        27 msiexec.exe 56 12->27         started        172 Maps a DLL or memory area into another process 15->172 29 cmd.exe 2 15->29         started        120 192.168.2.4, 138, 15847, 443 unknown unknown 18->120 122 239.255.255.250 unknown Reserved 18->122 31 msedge.exe 18->31         started        34 msedge.exe 18->34         started        36 msedge.exe 18->36         started        38 identity_helper.exe 18->38         started        file6 signatures7 process8 dnsIp9 78 C:\Users\user\AppData\...\vcruntime140.dll, PE32 23->78 dropped 80 C:\Users\user\AppData\...\msvcp140.dll, PE32 23->80 dropped 82 C:\Users\user\AppData\...\SplashWin.exe, PE32 23->82 dropped 84 C:\Users\user\AppData\...\DuiLib_u.dll, PE32 23->84 dropped 142 Switches to a custom stack to bypass stack traces 23->142 144 Found direct / indirect Syscall (likely to bypass EDR) 23->144 40 SplashWin.exe 1 23->40         started        86 C:\Users\user\AppData\...\vcruntime140.dll, PE32 27->86 dropped 88 C:\Users\user\AppData\Local\...\msvcp140.dll, PE32 27->88 dropped 90 C:\Users\user\AppData\Local\...\SplashWin.exe, PE32 27->90 dropped 94 4 other malicious files 27->94 dropped 43 SplashWin.exe 27->43         started        45 ISBEW64.exe 27->45         started        47 ISBEW64.exe 27->47         started        53 8 other processes 27->53 92 C:\Users\user\AppData\Local\Temp\ctgfskqqpp, PE32+ 29->92 dropped 146 Writes to foreign memory regions 29->146 148 Maps a DLL or memory area into another process 29->148 49 Syncsign_v1.exe 29->49         started        51 conhost.exe 29->51         started        128 2.23.227.208, 443, 49836 QA-ISPQA European Union 31->128 130 18.173.132.23, 443, 49879 MIT-GATEWAYSUS United States 31->130 132 28 other IPs or domains 31->132 file10 signatures11 process12 signatures13 150 Maps a DLL or memory area into another process 40->150 152 Switches to a custom stack to bypass stack traces 40->152 154 Found direct / indirect Syscall (likely to bypass EDR) 40->154 55 cmd.exe 5 40->55         started        59 cmd.exe 43->59         started        process14 file15 96 C:\Users\user\AppData\...\Syncsign_v1.exe, PE32+ 55->96 dropped 98 C:\Users\user\AppData\Local\Temp\pwvtwt, PE32+ 55->98 dropped 156 Writes to foreign memory regions 55->156 158 Found hidden mapped module (file has been removed from disk) 55->158 160 Maps a DLL or memory area into another process 55->160 162 Switches to a custom stack to bypass stack traces 55->162 61 Syncsign_v1.exe 2 55->61         started        65 conhost.exe 55->65         started        100 C:\Users\user\AppData\Local\...\xwielkiowcx, PE32 59->100 dropped 67 conhost.exe 59->67         started        69 backgroundTaskHost.exe 59->69         started        signatures16 process17 dnsIp18 124 piaktrip.online 104.21.40.182, 443, 49762, 49763 CLOUDFLARENETUS United States 61->124 126 undermymindops.com 172.67.164.91, 443, 49766 CLOUDFLARENETUS United States 61->126 164 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 61->164 166 Tries to harvest and steal browser information (history, passwords, etc) 61->166 168 Tries to harvest and steal Bitcoin Wallet information 61->168 170 Found direct / indirect Syscall (likely to bypass EDR) 61->170 71 msiexec.exe 7 61->71         started        74 msedge.exe 61->74         started        signatures19 process20 file21 102 C:\Users\user\AppData\Local\...\MSI1B74.tmp, PE32 71->102 dropped 104 C:\Users\user\AppData\Local\...\MSI14BC.tmp, PE32 71->104 dropped 76 msedge.exe 74->76         started        process22
Result
Malware family:
n/a
Score:
  7/10
Tags:
collection discovery persistence privilege_escalation spyware stealer
Behaviour
Checks SCSI registry key(s)
Enumerates system info in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
outlook_office_path
Browser Information Discovery
Enumerates physical storage devices
Event Triggered Execution: Installer Packages
Reads user/profile data of web browsers
System Location Discovery: System Language Discovery
Drops file in Windows directory
Executes dropped EXE
Loads dropped DLL
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Enumerates connected drives
Reads WinSCP keys stored on the system
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Malware family:
HijackLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Suspicious_Latam_MSI_and_ZIP_Files
Author:eremit4, P4nd3m1cb0y
Description:Detects suspicious .msi and .zip files used in Latam banking trojan campaigns.
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments