MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 363189b59e6f4f6ced2fd81ca31ef1299ac9989288f51162bd6c03fdb4fd5a50. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Stop


Vendor detections: 15


Intelligence 15 IOCs YARA 4 File information Comments

SHA256 hash: 363189b59e6f4f6ced2fd81ca31ef1299ac9989288f51162bd6c03fdb4fd5a50
SHA3-384 hash: b0237f568f2ae19bf78c489760411260a41a962fd34c6be08bfc70024458356259a4af326df3024915518c402b0554c2
SHA1 hash: 2cc13997c41f7a644c68cb49370f12549be7d6e8
MD5 hash: 1c93d8e983ae0251dd5d51186c7aa1fe
humanhash: utah-india-grey-juliet
File name:363189b59e6f4f6ced2fd81ca31ef1299ac9989288f51162bd6c03fdb4fd5a50
Download: download sample
Signature Stop
File size:772'608 bytes
First seen:2022-04-08 08:36:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e65b83417738f666152fabcdb3753ddc (8 x RaccoonStealer, 3 x Glupteba, 3 x RedLineStealer)
ssdeep 12288:nJ3jlAq/E8QAi25MGVUpGj1PA7IWHFuF/0KUxFEf3GkmW1BPA:J3j28LR75MGWG5Y7JQx6xFEfzBPA
Threatray 1'168 similar samples on MalwareBazaar
TLSH T1E1F41220F9B4D433E09546B598D5C6A1162CBDB37A30CE177BA7AE4E2F712D2222534F
File icon (PE):PE icon
dhash icon 48b9b2b0e8c38c90 (6 x Smoke Loader, 5 x RedLineStealer, 3 x CryptBot)
Reporter JAMESWT_WT
Tags:exe Stop

Intelligence


File Origin
# of uploads :
1
# of downloads :
184
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
363189b59e6f4f6ced2fd81ca31ef1299ac9989288f51162bd6c03fdb4fd5a50
Verdict:
Malicious activity
Analysis date:
2022-04-09 00:01:03 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Launching a process
Creating a process with a hidden window
Adding an access-denied ACE
Сreating synchronization primitives
Deleting a recently created file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
CPUID_Instruction
CheckCmdLine
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
STOP Ransomware
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
rans.spre.troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found malware configuration
Found ransom note / readme
Found stalling execution ending in API Sleep call
Infects executable files (exe, dll, sys, html)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Writes many files with high entropy
Yara detected Djvu Ransomware
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 606015 Sample: x5JVAGLCr6 Startdate: 08/04/2022 Architecture: WINDOWS Score: 100 59 Multi AV Scanner detection for domain / URL 2->59 61 Found malware configuration 2->61 63 Malicious sample detected (through community Yara rule) 2->63 65 7 other signatures 2->65 8 x5JVAGLCr6.exe 2->8         started        11 x5JVAGLCr6.exe 2->11         started        13 x5JVAGLCr6.exe 2->13         started        15 x5JVAGLCr6.exe 2->15         started        process3 signatures4 71 Found stalling execution ending in API Sleep call 8->71 73 Writes many files with high entropy 8->73 75 Injects a PE file into a foreign processes 8->75 17 x5JVAGLCr6.exe 1 16 8->17         started        77 Contains functionality to inject code into remote processes 11->77 21 x5JVAGLCr6.exe 12 11->21         started        23 x5JVAGLCr6.exe 12 13->23         started        25 x5JVAGLCr6.exe 15->25         started        process5 dnsIp6 55 api.2ip.ua 162.0.217.254, 443, 49733, 49734 ACPCA Canada 17->55 45 C:\Users\...\x5JVAGLCr6.exe:Zone.Identifier, ASCII 17->45 dropped 47 C:\Users\user\AppData\...\x5JVAGLCr6.exe, MS-DOS 17->47 dropped 27 x5JVAGLCr6.exe 17->27         started        30 icacls.exe 17->30         started        57 192.168.2.1 unknown unknown 21->57 file7 process8 signatures9 79 Injects a PE file into a foreign processes 27->79 32 x5JVAGLCr6.exe 1 17 27->32         started        process10 dnsIp11 49 securebiz.org 32->49 51 astdg.top 32->51 53 api.2ip.ua 32->53 37 C:\_readme.txt, ASCII 32->37 dropped 39 C:\Users\...\SmartScreenCache.dat.moqs (copy), data 32->39 dropped 41 C:\Users\user\...\MSIMGSIZ.DAT.moqs (copy), data 32->41 dropped 43 34 other files (31 malicious) 32->43 dropped 67 Infects executable files (exe, dll, sys, html) 32->67 69 Modifies existing user documents (likely ransomware behavior) 32->69 file12 signatures13
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2021-07-23 20:44:49 UTC
File Type:
PE (Exe)
Extracted files:
53
AV detection:
25 of 26 (96.15%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:djvu ransomware
Behaviour
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Detected Djvu ransomware
Djvu Ransomware
Malware Config
C2 Extraction:
http://astdg.top/nddddhsspen6/get.php
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_STOP
Author:ditekSHen
Description:Detects STOP ransomware
Rule name:SUSP_XORed_URL_in_EXE
Author:Florian Roth
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834
Rule name:SUSP_XORed_URL_in_EXE_RID2E46
Author:Florian Roth
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834
Rule name:win_stop_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.stop.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments