MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3882c65e9a7a8bfb85793f6ddfce465089a3b1b99b14e16aad7f71b93ccf3d91. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 3882c65e9a7a8bfb85793f6ddfce465089a3b1b99b14e16aad7f71b93ccf3d91
SHA3-384 hash: cbd835c3c9804a960bb3211f18fd569efdf1d3bdfbbb7fabfb51adbcf77dae56f3ab86d88fb161602457d712d2cfa5ee
SHA1 hash: 31dc51c7c1e2a5e8b4ca34b6f217c60ce757dbe5
MD5 hash: 458ac39a481ac9ed07487ee9986d2fe9
humanhash: potato-oven-chicken-finch
File name:file
Download: download sample
File size:2'535'424 bytes
First seen:2022-11-27 16:41:33 UTC
Last seen:2022-11-27 20:30:02 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9aebf3da4677af9275c461261e5abde3 (25 x YTStealer, 12 x CobaltStrike, 11 x Hive)
ssdeep 49152:yWSA/E1kQVibIswlJ/gTTF3OLJL0+jYbGvb4jIg5tfJVRo:yjSI3fJ/gF+LJL0+EbGT4Ug5tfJVRo
Threatray 208 similar samples on MalwareBazaar
TLSH T1D4C53324913703E0EBD91AB739F1421763C77EE06BAA8B9C566D60DCDCB1A5035E1378
TrID 63.5% (.EXE) UPX compressed Win64 Executable (70117/5/12)
24.5% (.EXE) UPX compressed Win32 Executable (27066/9/6)
4.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.8% (.ICL) Windows Icons Library (generic) (2059/9)
1.8% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter jstrosch
Tags:exe X64

Intelligence


File Origin
# of uploads :
2
# of downloads :
177
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
1f35d891cf93853d11c166ac59f66f8e.exe
Verdict:
Malicious activity
Analysis date:
2022-11-27 08:18:27 UTC
Tags:
trojan rat redline loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw
Score:
60 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 754702 Sample: file.exe Startdate: 27/11/2022 Architecture: WINDOWS Score: 60 21 Antivirus / Scanner detection for submitted sample 2->21 23 Multi AV Scanner detection for submitted file 2->23 7 file.exe 2->7         started        process3 dnsIp4 17 youtube-ui.l.google.com 142.250.203.110, 443, 49704 GOOGLEUS United States 7->17 19 www.youtube.com 7->19 25 Tries to harvest and steal browser information (history, passwords, etc) 7->25 11 cmd.exe 1 7->11         started        signatures5 process6 process7 13 conhost.exe 11->13         started        15 choice.exe 1 11->15         started       
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2022-11-24 09:24:23 UTC
File Type:
PE+ (Exe)
AV detection:
22 of 41 (53.66%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware stealer upx
Behaviour
Suspicious use of WriteProcessMemory
Reads user/profile data of web browsers
UPX packed file
Gathering data
Unpacked files
SH256 hash:
064a6d675d2e46f1ae43a21636dcbc88e0a7bceed55f72f28f05d0b99ddb7a14
MD5 hash:
ed7c6ef251edcd6f1b625262291dfef5
SHA1 hash:
67479cf5ae09b201914c20d84cff4a827ee1cee0
SH256 hash:
3882c65e9a7a8bfb85793f6ddfce465089a3b1b99b14e16aad7f71b93ccf3d91
MD5 hash:
458ac39a481ac9ed07487ee9986d2fe9
SHA1 hash:
31dc51c7c1e2a5e8b4ca34b6f217c60ce757dbe5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 3882c65e9a7a8bfb85793f6ddfce465089a3b1b99b14e16aad7f71b93ccf3d91

(this sample)

  
Delivery method
Distributed via web download

Comments