MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 35181f535df04c562e8df173ea4890a1f79cd12b3bfed2e0dfc448e1745ed8db. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 35181f535df04c562e8df173ea4890a1f79cd12b3bfed2e0dfc448e1745ed8db
SHA3-384 hash: c963e5f03e9e577a51c3f5eb93799b231fd7db7954da1944a69e533ecea198da8a5bf86e6afeb00d32c5725d4dad1143
SHA1 hash: 153c2533982a9f7d0131ad15b8eb86c914788b85
MD5 hash: 8e3de31b81a3a35867a54722d24c5386
humanhash: summer-potato-iowa-nine
File name:jrityzjn.csk.exe
Download: download sample
File size:828'928 bytes
First seen:2020-05-28 13:09:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'207 x SnakeKeylogger)
ssdeep 24576:tQ9ObprVwTcEZ/2hv1q2QMzJAYRolQAc:nZeQI2v1q6e4ol
Threatray 272 similar samples on MalwareBazaar
TLSH F0051227FF68D733DADC56724221695C932EA7886303C76A2CB41578B8D33A557702CE
Reporter abuse_ch
Tags:exe


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: mail.crainky.xyz
Sending IP: 167.71.96.137
From: Transaction Dept<office@mail.crainky.xyz>
Subject: Payment Confirmation
Attachment: PaymentInvoice.docm

Unknown payload URL:
http://185.205.209.166/dkkp/jrityzjn.csk.exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
75
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Genkryptik
Status:
Malicious
First seen:
2020-05-28 13:37:36 UTC
File Type:
PE (.Net Exe)
Extracted files:
5
AV detection:
17 of 31 (54.84%)
Threat level:
  5/5
Result
Malware family:
masslogger
Score:
  10/10
Tags:
family:masslogger evasion persistence ransomware spyware stealer
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Checks computer location settings
MassLogger
MassLogger log file
Modifies visibility of file extensions in Explorer
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe 35181f535df04c562e8df173ea4890a1f79cd12b3bfed2e0dfc448e1745ed8db

(this sample)

  
Delivery method
Distributed via web download

Comments