MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 378059b27606eae8b78d0ebcd8cf469ece63a8e36459ebb060739ac3bdb35d62. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Allaple


Vendor detections: 16


Intelligence 16 IOCs YARA 2 File information Comments

SHA256 hash: 378059b27606eae8b78d0ebcd8cf469ece63a8e36459ebb060739ac3bdb35d62
SHA3-384 hash: f5d3a8e8fc158e9a32e4c97cc9a7a53cd9a30a46f8ce1da2f838e11ff34d66b495672df003d01528017651bc4d3b903a
SHA1 hash: c951f9b852a6ee975f5e66ce6d9b3671fbffd989
MD5 hash: 4a877b33da7992ee741897eb26ce07f1
humanhash: cup-five-magnesium-lithium
File name:378059b27606eae8b78d0ebcd8cf469ece63a8e36459ebb060739ac3bdb35d62
Download: download sample
Signature Allaple
File size:209'610 bytes
First seen:2024-10-25 18:03:53 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash be4dffb3bd263b236b578907d68239c6 (1 x Allaple)
ssdeep 6144:Sapf3t9bio6l0LFpOA+dQ41MEL9888889ygxQQonEem2SX8:Sapf3ni1lJA+dQ4XL98888815o/Ss
Threatray 8 similar samples on MalwareBazaar
TLSH T112249DCE9A94DCC3F997293A054471FBF274415936F9A055BEF04AECE0A0F9242B82DD
TrID 28.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
25.5% (.EXE) Win32 Executable (generic) (4504/4/1)
11.6% (.ICL) Windows Icons Library (generic) (2059/9)
11.5% (.EXE) OS/2 Executable (generic) (2029/13)
11.3% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter JAMESWT_WT
Tags:217-195-153-196 allaple exe TMBackdoor

Intelligence


File Origin
# of uploads :
1
# of downloads :
515
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
378059b27606eae8b78d0ebcd8cf469ece63a8e36459ebb060739ac3bdb35d62
Verdict:
Malicious activity
Analysis date:
2024-10-25 18:05:53 UTC
Tags:
scan smbscan icmp

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
Allaple Exploit Dropper Overt
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Connection attempt
Changing a file
Creating a file in the Program Files subdirectories
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
overlay packed packed packer_detected
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
96 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Detected unpacking (creates a PE file in dynamic memory)
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Potential Persistence Via COM Hijacking From Suspicious Locations
Suricata IDS alerts for network traffic
Behaviour
Behavior Graph:
Threat name:
Win32.Worm.RaHack
Status:
Malicious
First seen:
2023-04-22 10:46:24 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
37 of 38 (97.37%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  4/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
d9641ca6237d6cd62cb9e313a758bc5197ea7c5f6cbcea6b11ae1a12fa7dda4d
MD5 hash:
ab678a987ced731140a15d925983b349
SHA1 hash:
477816fbc454e08014956ea25a964d4daad0f92f
SH256 hash:
4c8fbcbc69051bb934e843495e419d3fd9383fc953fef0b8e77d016522531944
MD5 hash:
b69d7427a0da7bf1ff6130b45d9a29b3
SHA1 hash:
8d3846216b222e58a86e868b142fe24b5aca6dd1
SH256 hash:
378059b27606eae8b78d0ebcd8cf469ece63a8e36459ebb060739ac3bdb35d62
MD5 hash:
4a877b33da7992ee741897eb26ce07f1
SHA1 hash:
c951f9b852a6ee975f5e66ce6d9b3671fbffd989
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_no_import_table
Description:Detect pe file that no import table

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::ReadConsoleOutputCharacterA
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::GetVolumePathNamesForVolumeNameA

Comments