MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3a2bf257d6c6ecb246abd6e50163f126ea4683ffaca7d20fbd861ddfa3dfe0a5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 8
| SHA256 hash: | 3a2bf257d6c6ecb246abd6e50163f126ea4683ffaca7d20fbd861ddfa3dfe0a5 |
|---|---|
| SHA3-384 hash: | 90d0e51e0d60ab702cde6ba68f609060826cb175d012145d61c7d909e57ad3bc7e45fef06bfb060b02a8142c7d2d5e63 |
| SHA1 hash: | adf9dd03fad70cd2493889c97814b1e7090604f6 |
| MD5 hash: | 0e2a4765d5e77ea83afaaf74b4ebee61 |
| humanhash: | wyoming-johnny-apart-saturn |
| File name: | 0e2a4765d5e77ea83afaaf74b4ebee61.exe |
| Download: | download sample |
| File size: | 3'240'960 bytes |
| First seen: | 2023-05-08 08:37:41 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 4ecfbe6e42943fae92c4582752c63b2b |
| ssdeep | 98304:kSJF1MQUm126K6cmRMiypcBIdZAqsZ4Ex:kg1MHRbzmmFndZAqsZ4M |
| TLSH | T1B6E522A434F87563FA0878700B2B5EF768F1B9B325084C17DB9E34AB426DF69F025166 |
| TrID | 54.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 11.4% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 8.7% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.8% (.EXE) Win32 Executable (generic) (4505/5/1) 3.6% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| Reporter | |
| Tags: | exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
245
Origin country :
NLVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0e2a4765d5e77ea83afaaf74b4ebee61.exe
Verdict:
Malicious activity
Analysis date:
2023-05-08 08:44:49 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Clean
Maliciousness:
Behaviour
Searching for the window
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Сreating synchronization primitives
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
anti-debug greyware packed
Verdict:
Malicious
Labled as:
Win/malicious_confidence_100%
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Suspicious
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
80 / 100
Signature
Antivirus / Scanner detection for submitted sample
Contain functionality to detect virtual machines
Creates autostart registry keys with suspicious names
Detected unpacking (creates a PE file in dynamic memory)
Hides threads from debuggers
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.Raccoonstealer
Status:
Suspicious
First seen:
2023-05-07 21:28:52 UTC
File Type:
PE (Exe)
AV detection:
18 of 37 (48.65%)
Threat level:
2/5
Detection(s):
Suspicious file
Verdict:
malicious
Result
Malware family:
n/a
Score:
7/10
Tags:
persistence
Behaviour
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
Unpacked files
SH256 hash:
3a2bf257d6c6ecb246abd6e50163f126ea4683ffaca7d20fbd861ddfa3dfe0a5
MD5 hash:
0e2a4765d5e77ea83afaaf74b4ebee61
SHA1 hash:
adf9dd03fad70cd2493889c97814b1e7090604f6
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
exe 3a2bf257d6c6ecb246abd6e50163f126ea4683ffaca7d20fbd861ddfa3dfe0a5
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.