MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 389a7b386cf1cb266462813f116b66c1e01fea86116a9c9c9630c890418fb2f1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 389a7b386cf1cb266462813f116b66c1e01fea86116a9c9c9630c890418fb2f1
SHA3-384 hash: 6d565e2912ce2bb71799af4cdcdb4a29bad82ee826c859d4a5127dc86ec8d5b7263f79c1dffa12d92bfb9b3e8198c7cc
SHA1 hash: ed494a14b1c5f46116582d4c20124adab5d08a1e
MD5 hash: 6ded49ae8ec00b7475f17c20a50eac9c
humanhash: monkey-ink-uranus-kitten
File name:SecuriteInfo.com.Win64.DropperX-gen.5482.22547
Download: download sample
File size:13'682'176 bytes
First seen:2023-06-30 19:46:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 196608:vGFYCPlajIJpFElcbX8l1NB/FMjScYG8+KxJyiGRwCblthl6IkDDaVVivzWy:OF9ajIqlU8lvfcYD+MEtltOIkD+gD
Threatray 30 similar samples on MalwareBazaar
TLSH T132D6235BF3D8ED71E58F66BEE152D9098363C41692EBB39D6A89B3F500C6770C908183
TrID 56.5% (.EXE) Win64 Executable (generic) (10523/12/4)
11.0% (.ICL) Windows Icons Library (generic) (2059/9)
10.9% (.EXE) OS/2 Executable (generic) (2029/13)
10.7% (.EXE) Generic Win/DOS Executable (2002/3)
10.7% (.EXE) DOS Executable Generic (2000/1)
Reporter SecuriteInfoCom
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
255
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Sending an HTTP GET request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
84 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Generic
Status:
Suspicious
First seen:
2023-06-28 22:59:28 UTC
File Type:
PE+ (.Net Exe)
Extracted files:
3
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
collection spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
389a7b386cf1cb266462813f116b66c1e01fea86116a9c9c9630c890418fb2f1
MD5 hash:
6ded49ae8ec00b7475f17c20a50eac9c
SHA1 hash:
ed494a14b1c5f46116582d4c20124adab5d08a1e
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments