MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3a8f15bbb97731a7a4fcb8fc597349314ed908acf18587ca8c37d64223806ff5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments 1

SHA256 hash: 3a8f15bbb97731a7a4fcb8fc597349314ed908acf18587ca8c37d64223806ff5
SHA3-384 hash: 43d536210d73ca34481e1607bad0f3d82eac24935f7a022234d572ab094ccace9cd3e83560debffa8d398f3ce45c42b9
SHA1 hash: 8a4669d7875df3f4c225bef88d03d36971f6ed8b
MD5 hash: 14b6da217d447d6cf60588a2ffc0eab6
humanhash: fifteen-foxtrot-artist-black
File name:14b6da21_by_Libranalysis
Download: download sample
File size:831'084 bytes
First seen:2021-05-22 00:14:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d3bf8a7746a8d1ee8f6e5960c3f69378 (247 x Formbook, 75 x AgentTesla, 64 x SnakeKeylogger)
ssdeep 24576:dRmJkcoQricOIQxiZY1iaYtkFUYaTgKEgIB2n:SJZoQrbTFZY1iaYeFYcKEgIAn
Threatray 240 similar samples on MalwareBazaar
TLSH B305C021F9C68036C2F327B19E7EF766963D69360336D19B27C82D315EA05816B39723
Reporter Libranalysis


Avatar
Libranalysis
Uploaded as part of the sample sharing project

Intelligence


File Origin
# of uploads :
1
# of downloads :
122
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
14b6da21_by_Libranalysis
Verdict:
Malicious activity
Analysis date:
2021-05-22 00:28:36 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Deleting a recently created file
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a custom TCP request
Creating a process from a recently created file
Reading critical registry keys
Creating a file
Changing a file
Sending a UDP request
Stealing user critical data
Forced shutdown of a browser
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
rans.evad
Score:
64 / 100
Signature
Changes the wallpaper picture
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for submitted file
Sigma detected: WScript or CScript Dropper
Windows Update Standalone Installer command line found (may be used to bypass UAC)
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.Pocrimcrypt
Status:
Malicious
First seen:
2021-05-18 23:41:13 UTC
AV detection:
28 of 29 (96.55%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion ransomware trojan
Behaviour
Modifies Control Panel
Modifies registry class
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Drops file in System32 directory
Sets desktop wallpaper using registry
Enumerates connected drives
Loads dropped DLL
UAC bypass
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE).

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-22 01:04:03 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0001.033] Anti-Behavioral Analysis::Timing/Delay Check QueryPerformanceCounter
1) [B0009.012] Anti-Behavioral Analysis::Human User Check
2) [F0002.002] Collection::Polling
4) [B0030.002] Command and Control::Receive Data
5) [B0030.001] Command and Control::Send Data
6) [C0002.009] Communication Micro-objective::Connect to Server::HTTP Communication
7) [C0002.012] Communication Micro-objective::Create Request::HTTP Communication
8) [C0002.017] Communication Micro-objective::Get Response::HTTP Communication
9) [C0002.004] Communication Micro-objective::Open URL::HTTP Communication
10) [C0002.003] Communication Micro-objective::Send Request::HTTP Communication
11) [C0003.001] Communication Micro-objective::Create Pipe::Interprocess Communication
12) [C0027.009] Cryptography Micro-objective::RC4::Encrypt Data
13) [C0021.005] Cryptography Micro-objective::Mersenne Twister::Generate Pseudo-random Sequence
14) [C0021.004] Cryptography Micro-objective::RC4 PRGA::Generate Pseudo-random Sequence
15) [C0026.001] Data Micro-objective::Base64::Encode Data
16) [C0026.002] Data Micro-objective::XOR::Encode Data
19) [B0043] Discovery::Taskbar Discovery
20) [C0045] File System Micro-objective::Copy File
21) [C0046] File System Micro-objective::Create Directory
22) [C0048] File System Micro-objective::Delete Directory
23) [C0047] File System Micro-objective::Delete File
24) [C0049] File System Micro-objective::Get File Attributes
25) [C0051] File System Micro-objective::Read File
26) [C0050] File System Micro-objective::Set File Attributes
27) [C0052] File System Micro-objective::Writes File
28) [E1510] Impact::Clipboard Modification
29) [C0007] Memory Micro-objective::Allocate Memory
30) [C0034.001] Operating System Micro-objective::Set Variable::Environment Variable
31) [C0036.004] Operating System Micro-objective::Create Registry Key::Registry
32) [C0036.002] Operating System Micro-objective::Delete Registry Key::Registry
33) [C0036.007] Operating System Micro-objective::Delete Registry Value::Registry
34) [C0036.003] Operating System Micro-objective::Open Registry Key::Registry
35) [C0036.005] Operating System Micro-objective::Query Registry Key::Registry
36) [C0036.006] Operating System Micro-objective::Query Registry Value::Registry
37) [C0036.001] Operating System Micro-objective::Set Registry Key::Registry
38) [C0040] Process Micro-objective::Allocate Thread Local Storage
39) [C0017] Process Micro-objective::Create Process
40) [C0038] Process Micro-objective::Create Thread
41) [C0054] Process Micro-objective::Resume Thread
42) [C0041] Process Micro-objective::Set Thread Local Storage Value
43) [C0018] Process Micro-objective::Terminate Process
44) [C0039] Process Micro-objective::Terminate Thread