MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3bb788b0d558a8e52a71b1fcb57ee9c74ce4949a5398831fb8aad57f029f2b3d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Nymaim


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments 1

SHA256 hash: 3bb788b0d558a8e52a71b1fcb57ee9c74ce4949a5398831fb8aad57f029f2b3d
SHA3-384 hash: 741d96287eac1dc0a03286f3630726fcf7953ca4da7c1b90bf8740bfeb60e4f0149e991ad067114815c9c1f510478c58
SHA1 hash: 093b08f2be8f8c56303b6c0d6a6577d362c77ac0
MD5 hash: 8908dd0993b3e964858095b1bbcf4101
humanhash: lactose-whiskey-washington-diet
File name:8908dd0993b3e964858095b1bbcf4101
Download: download sample
Signature Nymaim
File size:399'872 bytes
First seen:2022-05-21 08:56:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 1dd726520e2e2364fd0217d0df0f77fb (2 x Nymaim, 2 x RedLineStealer)
ssdeep 6144:tci+0ykCv6HrEre3U4uFdywXQIDl2SFR3HGsSzORBGqYHk+V7:tpOkiErlkFdywAI1bWHyTGqYHk+V7
TLSH T13784BF00BB90D034F5B721F88976C279752EBEE09B2455CB62E53AEE5A356E0EC30357
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 86e8e0e8e8e0d0c8 (1 x Nymaim)
Reporter zbetcheckin
Tags:32 exe NyMaim

Intelligence


File Origin
# of uploads :
1
# of downloads :
627
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
https://google.com
Verdict:
Malicious activity
Analysis date:
2022-05-21 08:31:58 UTC
Tags:
stealer loader evasion trojan rat redline phishing opendir hiloti systembc arkei vidar socelars tofsee amadey ransomware stop miner

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for synchronization primitives
Сreating synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
Running batch commands
Creating a process with a hidden window
Launching a tool to kill processes
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
CheckCmdLine
EvasionGetTickCount
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware packed smokeloader
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
60 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected Nymaim
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 631555 Sample: 17OHPdUO0k Startdate: 21/05/2022 Architecture: WINDOWS Score: 60 36 Multi AV Scanner detection for submitted file 2->36 38 Yara detected Nymaim 2->38 40 Machine Learning detection for sample 2->40 7 17OHPdUO0k.exe 1 2->7         started        process3 process4 9 WerFault.exe 9 7->9         started        12 WerFault.exe 9 7->12         started        14 WerFault.exe 9 7->14         started        16 5 other processes 7->16 file5 22 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 9->22 dropped 24 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 12->24 dropped 26 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 14->26 dropped 28 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 16->28 dropped 30 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 16->30 dropped 32 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 16->32 dropped 34 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 16->34 dropped 18 taskkill.exe 1 16->18         started        20 conhost.exe 16->20         started        process6
Threat name:
Win32.Trojan.Strab
Status:
Malicious
First seen:
2022-05-21 08:50:53 UTC
File Type:
PE (Exe)
Extracted files:
31
AV detection:
18 of 26 (69.23%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Kills process with taskkill
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Checks computer location settings
Deletes itself
Unpacked files
SH256 hash:
2134686cff47d2a4ab1061f06fdd76d129143ed6a231044f4d970c55f401991d
MD5 hash:
4b3ec93df45d6728fc527559ebff6824
SHA1 hash:
f300a9ac24225b3452e6bd0f625aa331bc34e142
SH256 hash:
2134686cff47d2a4ab1061f06fdd76d129143ed6a231044f4d970c55f401991d
MD5 hash:
4b3ec93df45d6728fc527559ebff6824
SHA1 hash:
f300a9ac24225b3452e6bd0f625aa331bc34e142
SH256 hash:
2134686cff47d2a4ab1061f06fdd76d129143ed6a231044f4d970c55f401991d
MD5 hash:
4b3ec93df45d6728fc527559ebff6824
SHA1 hash:
f300a9ac24225b3452e6bd0f625aa331bc34e142
SH256 hash:
722ab11ce48713c2e73aca578a49b807527ac7e0847c10baf5864d3842853b7f
MD5 hash:
64380c14227f4ae62f2fde336d5c34df
SHA1 hash:
8a1a1f5fe7f5d319ce215220446255c2f44655d7
SH256 hash:
3bb788b0d558a8e52a71b1fcb57ee9c74ce4949a5398831fb8aad57f029f2b3d
MD5 hash:
8908dd0993b3e964858095b1bbcf4101
SHA1 hash:
093b08f2be8f8c56303b6c0d6a6577d362c77ac0
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Nymaim

Executable exe 3bb788b0d558a8e52a71b1fcb57ee9c74ce4949a5398831fb8aad57f029f2b3d

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-05-21 08:56:44 UTC

url : hxxp://2.58.149.159/load.php?pub=mixfive/