MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3905f8d441908527f02140c7e2b9939978d824485dba4fa15ebe247d42385f05. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 7
| SHA256 hash: | 3905f8d441908527f02140c7e2b9939978d824485dba4fa15ebe247d42385f05 |
|---|---|
| SHA3-384 hash: | ba453b48b38ad9fc62434f41a6f7da64f226e4e587cf1521420dd50bea4fa127d4a5c43518772f52c0fb9a774c92d578 |
| SHA1 hash: | ababab5a6b495a9598aeaec0233f0d1aa1b611a6 |
| MD5 hash: | 3e2c1ae2203bcd60588a7585ae7abe88 |
| humanhash: | india-april-sierra-network |
| File name: | SecuriteInfo.com.Trojan.PWS.Siggen2.60993.15327.12025 |
| Download: | download sample |
| File size: | 901'120 bytes |
| First seen: | 2021-01-04 16:47:19 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'602 x Formbook, 12'241 x SnakeKeylogger) |
| ssdeep | 12288:TQyvOmt/sLxZZbIusIjxXCx1x6jdRbYubxGuJ/eAsM4l2Tp:kyvOmt/sLxQuPCalYubxG0Jf |
| Threatray | 8 similar samples on MalwareBazaar |
| TLSH | F2154A20B2B0DDF7F553023138247188297EA28762C9920EAA377AD45377B71F5DCE66 |
| Reporter |
Intelligence
File Origin
# of uploads :
1
# of downloads :
99
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Keygen.exe
Verdict:
Malicious activity
Analysis date:
2021-01-04 11:34:45 UTC
Tags:
trojan rat azorult stealer raccoon remcos
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Sending a UDP request
Unauthorized injection to a recently created process
Creating a file
Launching a process
Blocking the Windows Defender launch
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
68 / 100
Signature
Disables Windows Defender (via service or powershell)
Injects a PE file into a foreign processes
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AntiVM_3
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Packed.Generic
Status:
Suspicious
First seen:
2021-01-04 16:48:08 UTC
AV detection:
15 of 29 (51.72%)
Threat level:
1/5
Verdict:
unknown
Similar samples:
Result
Malware family:
n/a
Score:
10/10
Tags:
evasion trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Windows security modification
Contains code to disable Windows Defender
Modifies Windows Defender Real-time Protection settings
Unpacked files
SH256 hash:
3905f8d441908527f02140c7e2b9939978d824485dba4fa15ebe247d42385f05
MD5 hash:
3e2c1ae2203bcd60588a7585ae7abe88
SHA1 hash:
ababab5a6b495a9598aeaec0233f0d1aa1b611a6
SH256 hash:
64a419709ad219ffc006bda776b650da486d55048d2fa34525f40227da0e5c86
MD5 hash:
88c0ec8398978fa2e4240f02765086ad
SHA1 hash:
5a5c4935b2d70e890c89ad9332365f4f4aa86f3c
SH256 hash:
3bb3ef934f36ef1ba3eda28372d9c2126855dbf900a2501652c93571d97726a0
MD5 hash:
cad0d7233a4eb842d005b2bda705e846
SHA1 hash:
b49ca0be1a774ebbae502eabb18e1e66a8a8ee09
SH256 hash:
88e7d1e5414b8fceb396130e98482829eac4bdc78fbc3fe7fb3f4432137e0e03
MD5 hash:
f4b5c1ebf4966256f52c4c4ceae87fb1
SHA1 hash:
ca70ec96d1a65cb2a4cbf4db46042275dc75813b
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Trojan
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
exe 3905f8d441908527f02140c7e2b9939978d824485dba4fa15ebe247d42385f05
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.