MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3905f8d441908527f02140c7e2b9939978d824485dba4fa15ebe247d42385f05. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 3905f8d441908527f02140c7e2b9939978d824485dba4fa15ebe247d42385f05
SHA3-384 hash: ba453b48b38ad9fc62434f41a6f7da64f226e4e587cf1521420dd50bea4fa127d4a5c43518772f52c0fb9a774c92d578
SHA1 hash: ababab5a6b495a9598aeaec0233f0d1aa1b611a6
MD5 hash: 3e2c1ae2203bcd60588a7585ae7abe88
humanhash: india-april-sierra-network
File name:SecuriteInfo.com.Trojan.PWS.Siggen2.60993.15327.12025
Download: download sample
File size:901'120 bytes
First seen:2021-01-04 16:47:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'602 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:TQyvOmt/sLxZZbIusIjxXCx1x6jdRbYubxGuJ/eAsM4l2Tp:kyvOmt/sLxQuPCalYubxG0Jf
Threatray 8 similar samples on MalwareBazaar
TLSH F2154A20B2B0DDF7F553023138247188297EA28762C9920EAA377AD45377B71F5DCE66
Reporter SecuriteInfoCom

Intelligence


File Origin
# of uploads :
1
# of downloads :
99
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Keygen.exe
Verdict:
Malicious activity
Analysis date:
2021-01-04 11:34:45 UTC
Tags:
trojan rat azorult stealer raccoon remcos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Unauthorized injection to a recently created process
Creating a file
Launching a process
Blocking the Windows Defender launch
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
68 / 100
Signature
Disables Windows Defender (via service or powershell)
Injects a PE file into a foreign processes
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AntiVM_3
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 335840 Sample: SecuriteInfo.com.Trojan.PWS... Startdate: 04/01/2021 Architecture: WINDOWS Score: 68 39 Multi AV Scanner detection for submitted file 2->39 41 Yara detected AntiVM_3 2->41 43 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 2->43 45 Disables Windows Defender (via service or powershell) 2->45 8 SecuriteInfo.com.Trojan.PWS.Siggen2.60993.15327.exe 3 2->8         started        process3 file4 37 SecuriteInfo.com.T...60993.15327.exe.log, ASCII 8->37 dropped 47 Injects a PE file into a foreign processes 8->47 12 SecuriteInfo.com.Trojan.PWS.Siggen2.60993.15327.exe 1 1 8->12         started        signatures5 process6 signatures7 49 Disables Windows Defender (via service or powershell) 12->49 15 powershell.exe 24 12->15         started        17 powershell.exe 8 12->17         started        19 powershell.exe 8 12->19         started        21 10 other processes 12->21 process8 process9 23 conhost.exe 15->23         started        25 conhost.exe 17->25         started        27 conhost.exe 19->27         started        29 conhost.exe 21->29         started        31 conhost.exe 21->31         started        33 conhost.exe 21->33         started        35 5 other processes 21->35
Threat name:
ByteCode-MSIL.Packed.Generic
Status:
Suspicious
First seen:
2021-01-04 16:48:08 UTC
AV detection:
15 of 29 (51.72%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Windows security modification
Contains code to disable Windows Defender
Modifies Windows Defender Real-time Protection settings
Unpacked files
SH256 hash:
3905f8d441908527f02140c7e2b9939978d824485dba4fa15ebe247d42385f05
MD5 hash:
3e2c1ae2203bcd60588a7585ae7abe88
SHA1 hash:
ababab5a6b495a9598aeaec0233f0d1aa1b611a6
SH256 hash:
64a419709ad219ffc006bda776b650da486d55048d2fa34525f40227da0e5c86
MD5 hash:
88c0ec8398978fa2e4240f02765086ad
SHA1 hash:
5a5c4935b2d70e890c89ad9332365f4f4aa86f3c
SH256 hash:
3bb3ef934f36ef1ba3eda28372d9c2126855dbf900a2501652c93571d97726a0
MD5 hash:
cad0d7233a4eb842d005b2bda705e846
SHA1 hash:
b49ca0be1a774ebbae502eabb18e1e66a8a8ee09
SH256 hash:
88e7d1e5414b8fceb396130e98482829eac4bdc78fbc3fe7fb3f4432137e0e03
MD5 hash:
f4b5c1ebf4966256f52c4c4ceae87fb1
SHA1 hash:
ca70ec96d1a65cb2a4cbf4db46042275dc75813b
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 3905f8d441908527f02140c7e2b9939978d824485dba4fa15ebe247d42385f05

(this sample)

  
Delivery method
Distributed via web download

Comments