MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 34d91b22ea349b6a78bd4b89af5b10a9be2487fe433526155d4460e3bfc2b85e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



frp


Vendor detections: 9


Intelligence 9 IOCs YARA 17 File information Comments

SHA256 hash: 34d91b22ea349b6a78bd4b89af5b10a9be2487fe433526155d4460e3bfc2b85e
SHA3-384 hash: 5caf4454e7eebc851764d28e57b3219a90beb3aa514c7d926684af72232d11711a88dce9451cd291cc20cc54a06615ba
SHA1 hash: 8332f7da71d09bc225151c96ccc8c3ba7e1ae9c1
MD5 hash: a39e1677a35f8d0da53079b554534a61
humanhash: xray-florida-oranges-alabama
File name:trmm-cocody-nono-workstation-amd64.exe
Download: download sample
Signature frp
File size:5'277'312 bytes
First seen:2023-11-10 09:40:58 UTC
Last seen:2023-11-10 11:21:00 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f0ea7b7844bbc5bfa9bb32efdcea957c (61 x Sliver, 17 x CobaltStrike, 12 x AsyncRAT)
ssdeep 49152:MRg0nHoi1euVvrb/T8vO90d7HjmAFd4A64nsfJml6OEchY4Vx9n5on0IroszVK5W:vi1euVwE2f5CWszcGEh+e6V
Threatray 3 similar samples on MalwareBazaar
TLSH T1CE363B47F85551E8C1AED234CA259263BA707C891B3033D36BA0F7B82B73BD46A79354
TrID 48.7% (.EXE) Win64 Executable (generic) (10523/12/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon f08e61b3b2b2cc71 (10 x Adware.Generic, 1 x frp)
Reporter 0xToxin
Tags:exe frp signed

Code Signing Certificate

Organisation:AmidaWare LLC
Issuer:DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
Algorithm:sha256WithRSAEncryption
Valid from:2023-03-03T00:00:00Z
Valid to:2024-05-03T23:59:59Z
Serial number: 0fef30ccce9d30183067160018796558
Thumbprint Algorithm:SHA256
Thumbprint: 8594cb28284e8890a87e6b26ba51fc5a136082b06b0d25cb658e83cd9bb3f49f
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
323
Origin country :
IL IL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Sending a custom TCP request
Creating a file
Creating a process from a recently created file
Creating a file in the %temp% subdirectories
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Running batch commands
Creating a process with a hidden window
Launching a process
Using the Windows Management Instrumentation requests
Searching for the window
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Modifying a system file
Launching the process to interact with network services
Launching a tool to kill processes
Gathering data
Verdict:
No Threat
Threat level:
  2.5/10
Confidence:
91%
Tags:
expand golang greyware lolbin overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
40 / 100
Signature
Creates files in the system32 config directory
Disables security and backup related services
Early bird code injection technique detected
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1340484 Sample: trmm-cocody-nono-workstatio... Startdate: 10/11/2023 Architecture: WINDOWS Score: 40 111 objects.githubusercontent.com 2->111 113 mesh.greenface.work 2->113 115 4 other IPs or domains 2->115 133 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 2->133 135 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 2->135 137 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 2->137 139 Queries memory information (via WMI often done to detect virtual machines) 2->139 11 tacticalrmm.exe 2->11         started        15 trmm-cocody-nono-workstation-amd64.exe 3 2->15         started        18 MeshAgent.exe 7 8 2->18         started        signatures3 process4 dnsIp5 119 github.com 20.29.134.23, 443, 49727 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 11->119 121 objects.githubusercontent.com 185.199.108.133, 443, 49728 FASTLYUS Netherlands 11->121 101 C:\Program Files\...\winsound.pyd, PE32+ 11->101 dropped 103 C:\Program Files\...\vcruntime140_1.dll, PE32+ 11->103 dropped 105 C:\Program Files\...\vcruntime140.dll, PE32+ 11->105 dropped 109 827 other files (none is malicious) 11->109 dropped 20 python.exe 11->20         started        22 tacticalrmm.exe 11->22         started        24 MeshAgent.exe 11->24         started        123 agents.tacticalrmm.com 104.21.12.79, 443, 49709, 49710 CLOUDFLARENETUS United States 15->123 107 C:\...\tacticalagent-v2.5.0-windows-amd64.exe, PE32 15->107 dropped 145 Early bird code injection technique detected 15->145 26 tacticalagent-v2.5.0-windows-amd64.exe 2 15->26         started        29 tacticalrmm.exe 9 3 15->29         started        33 conhost.exe 15->33         started        147 Creates files in the system32 config directory 18->147 file6 signatures7 process8 dnsIp9 35 conhost.exe 20->35         started        37 conhost.exe 22->37         started        39 conhost.exe 24->39         started        95 C:\...\tacticalagent-v2.5.0-windows-amd64.tmp, PE32 26->95 dropped 41 tacticalagent-v2.5.0-windows-amd64.tmp 23 17 26->41         started        125 icanhazip.tacticalrmm.io 104.21.46.245, 443, 49721, 49747 CLOUDFLARENETUS United States 29->125 127 api.greenface.work 109.123.237.16, 443, 49711, 49714 CASABLANCA-ASInternetCollocationProviderCZ Czech Republic 29->127 97 C:\Program Files\...\meshagent.exe, PE32+ 29->97 dropped 99 C:\ProgramData\TacticalRMM\416111776.py, Python 29->99 dropped 143 Early bird code injection technique detected 29->143 45 meshagent.exe 10 3 29->45         started        47 MeshAgent.exe 29->47         started        file10 signatures11 process12 file13 85 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 41->85 dropped 87 C:\Program Files\TacticalAgent\is-M7SUM.tmp, PE32+ 41->87 dropped 89 C:\Program Files\TacticalAgent\is-4DQ6U.tmp, PE32 41->89 dropped 91 (copy), PE32 41->91 dropped 141 Disables security and backup related services 41->141 49 cmd.exe 1 41->49         started        52 cmd.exe 1 41->52         started        54 cmd.exe 1 41->54         started        56 5 other processes 41->56 93 C:\Program Files\Mesh Agent\MeshAgent.exe, PE32+ 45->93 dropped signatures14 process15 signatures16 129 Uses ping.exe to sleep 49->129 131 Uses ping.exe to check the status of other devices and networks 49->131 58 PING.EXE 1 49->58         started        61 net.exe 1 49->61         started        63 conhost.exe 49->63         started        65 net.exe 1 52->65         started        73 2 other processes 52->73 67 net.exe 1 54->67         started        69 conhost.exe 54->69         started        71 net.exe 1 56->71         started        75 9 other processes 56->75 process17 dnsIp18 117 127.0.0.1 unknown unknown 58->117 77 net1.exe 1 61->77         started        79 net1.exe 1 65->79         started        81 net1.exe 1 67->81         started        83 net1.exe 1 71->83         started        process19
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery evasion persistence
Behaviour
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies system certificate store
Runs net.exe
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Blocklisted process makes network request
Sets service image path in registry
Stops running service(s)
Unpacked files
SH256 hash:
34d91b22ea349b6a78bd4b89af5b10a9be2487fe433526155d4460e3bfc2b85e
MD5 hash:
a39e1677a35f8d0da53079b554534a61
SHA1 hash:
8332f7da71d09bc225151c96ccc8c3ba7e1ae9c1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:GoBinTest
Rule name:golang
Rule name:Golangmalware
Author:Dhanunjaya
Description:Malware in Golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:golang_duffcopy_amd64
Rule name:HiveRansomware
Author:Dhanunjaya
Description:Yara Rule To Detect Hive V4 Ransomware
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments