MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 35b37b30779ff09b08ee04b1a284ec172dbf9767bd6afac8ade45ac09fe186b7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 35b37b30779ff09b08ee04b1a284ec172dbf9767bd6afac8ade45ac09fe186b7
SHA3-384 hash: 5f152e3d61523b8f8009b4097ce1518f304b86a1b3ea67fd1c4c098c6153d0563cbe7bd29989a1ee861b8f5c95f5cf67
SHA1 hash: 3eda527bcf470ec7452d3c2f843976366c422945
MD5 hash: f7e72022744878959ba47595c9d84071
humanhash: foxtrot-missouri-may-nineteen
File name:35b37b30779ff09b08ee04b1a284ec172dbf9767bd6afac8ade45ac09fe186b7
Download: download sample
File size:1'323'256 bytes
First seen:2022-05-06 08:41:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 575ea90c069471216fa3adaba586119e (5 x Gh0stRAT, 2 x QuasarRAT, 1 x DarkComet)
ssdeep 24576:B/rSKfyjyydWxxBEDGnwHFkglAAeA+WVjmijSdX/WjHYFVBbveGFJacUWVm0F1la:B/eKfyjyydWzBk4wlrlLjSdvW4xSGLR2
Threatray 7'917 similar samples on MalwareBazaar
TLSH T1D7552315A40C47C1DD53873B668A671E8142FFBFA592F12976DAF2123AF3340A29D738
TrID 35.7% (.EXE) UPX compressed Win32 Executable (27066/9/6)
35.0% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4)
8.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.9% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 8189a080a0a08080 (1 x Gh0stRAT, 1 x Metasploit)
Reporter JAMESWT_WT
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
244
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
35b37b30779ff09b08ee04b1a284ec172dbf9767bd6afac8ade45ac09fe186b7
Verdict:
Malicious activity
Analysis date:
2022-05-06 08:48:21 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Creating a window
Searching for the window
Searching for synchronization primitives
Creating a file
Enabling the 'hidden' option for files in the %temp% directory
Running batch commands
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Reading critical registry keys
Sending a custom TCP request
Launching a process
Unauthorized injection to a recently created process
Launching a tool to kill processes
Stealing user critical data
Forced shutdown of a browser
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 621469 Sample: QtYv4GY2L0 Startdate: 06/05/2022 Architecture: WINDOWS Score: 100 61 Malicious sample detected (through community Yara rule) 2->61 63 Antivirus detection for dropped file 2->63 65 Antivirus / Scanner detection for submitted sample 2->65 67 6 other signatures 2->67 9 QtYv4GY2L0.exe 10 2->9         started        process3 file4 47 C:\Users\user\AppData\Local\Temp\Temp\Q.exe, PE32 9->47 dropped 49 C:\Users\user\...\ClemExternal_March_30.exe, PE32 9->49 dropped 12 ClemExternal_March_30.exe 9 9->12         started        16 Q.exe 10 9->16         started        process5 file6 51 C:\Users\user\...\ClemExternal_March_30.exe, PE32 12->51 dropped 53 C:\Users\user\AppData\...\ClemExternal.exe, PE32 12->53 dropped 79 Multi AV Scanner detection for dropped file 12->79 81 Machine Learning detection for dropped file 12->81 18 ClemExternal.exe 5 12->18         started        23 ClemExternal_March_30.exe 1 12->23         started        55 C:\Users\user\AppData\...\tishiwenben.exe, PE32+ 16->55 dropped 57 C:\Users\user\AppData\Local\...\slsup.com.exe, PE32 16->57 dropped 83 Antivirus detection for dropped file 16->83 25 slsup.com.exe 2 16->25         started        27 tishiwenben.exe 5 16->27         started        signatures7 process8 dnsIp9 59 95.143.179.147, 49777, 55555 RHTEC-ASrh-tecIPBackboneDE Russian Federation 18->59 45 RoamingUdIJIwy0zwM...MPD8CRE4DMsWC7A.exe, PE32+ 18->45 dropped 69 Antivirus detection for dropped file 18->69 71 Multi AV Scanner detection for dropped file 18->71 73 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 18->73 75 Tries to harvest and steal browser information (history, passwords, etc) 18->75 29 conhost.exe 23->29         started        31 cmd.exe 23->31         started        77 Machine Learning detection for dropped file 25->77 33 cmd.exe 1 25->33         started        35 wscript.exe 27->35         started        file10 signatures11 process12 process13 37 conhost.exe 33->37         started        39 taskkill.exe 33->39         started        41 taskkill.exe 33->41         started        43 25 other processes 33->43
Threat name:
Win32.Trojan.Pandex
Status:
Malicious
First seen:
2022-04-25 12:46:34 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
39 of 42 (92.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
discovery evasion spyware stealer upx
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Checks installed software on the system
Maps connected drives based on registry
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Looks for VMWare Tools registry key
UPX packed file
Looks for VirtualBox Guest Additions in registry
Unpacked files
SH256 hash:
718b25aac4e9e1b48a06b30f389c75a406c261f47836e8033343b1b87c4e03f4
MD5 hash:
7e420cae149e55bc8d4e5b946c46ab9a
SHA1 hash:
421d6e01acae1052c1d75ca2c0dbf424203c6329
SH256 hash:
3bb374a6907a7812b9a9a6bbcbcf3eb40f02f618c216aae8ec3fb522a44d7b00
MD5 hash:
789067873f10aaf7d2fcf81d4634b582
SHA1 hash:
ffc0c5dac215a1f688ef2e987355e9def4e3c388
SH256 hash:
1a4afe0e18f3616cb46d3af998261ac6354417dc76295dabf34c39b564be186d
MD5 hash:
0a24ceac25ed8e3d4e574d7abd442048
SHA1 hash:
0331e32aa4960b4e372eeb77b04747c506b594d9
SH256 hash:
144ed897de341b8bee0548f5005981b37cc91a0317e695d43fa43a21154351d2
MD5 hash:
0c3e0ff82f274993751dfdb6ea11051b
SHA1 hash:
36861d90fe9f83f393225959d0574e74d3091f10
SH256 hash:
bc9914826d1763bff1e4ad9ac584153c2b0735f098742f07ddd241f9f205a89c
MD5 hash:
7b1737b5d1790a04af0fd6177b9f9c62
SHA1 hash:
ce186f779a3bf59453f32dc8b594b96c0a5dcab3
SH256 hash:
544eb4fc92f33d7a36ae0eba1259ac8096d1197b4f8b1abc9a2df40857cb12ee
MD5 hash:
ff18c8c7bea566ea40cf4cc429e9e5ca
SHA1 hash:
d0f9f484b9eabc675132ad3f8cbc41b5f2be8d68
SH256 hash:
35b37b30779ff09b08ee04b1a284ec172dbf9767bd6afac8ade45ac09fe186b7
MD5 hash:
f7e72022744878959ba47595c9d84071
SHA1 hash:
3eda527bcf470ec7452d3c2f843976366c422945
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments