MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3bed0900c2ba2423e8b4882ef157f017a4f84068bd1f5721c0a7567a13cbb66d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 3bed0900c2ba2423e8b4882ef157f017a4f84068bd1f5721c0a7567a13cbb66d
SHA3-384 hash: 469aafecac6585f06807fa33c69a7853e45c68e14c106c6cf41553cfcd4962fa1dc8dba5e502a2f21cc06e19b011f9a7
SHA1 hash: 3a17c5efc0b4be3f6fc3e1b5f00aa1acf431d87d
MD5 hash: 592a1f0cf5c3d2c42c4f2edf4ae9d02b
humanhash: nuts-robin-nuts-fix
File name:592a1f0cf5c3d2c42c4f2edf4ae9d02b.exe
Download: download sample
File size:291'840 bytes
First seen:2020-10-14 14:46:27 UTC
Last seen:2020-10-25 22:55:32 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 6144:gQEJityLfIjOjO7+Tw925wdbTeC9/TyoUxa0nb5V6lf0FmvKlj4:gQtoWr7YA52o4pb5V6lbSS
Threatray 606 similar samples on MalwareBazaar
TLSH 62544BCA3A52798FDA6E8C72C9141E30E620B666770FF397346375DB9D4E3928E010B5
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
67
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Unauthorized injection to a recently created process
Creating a file
Launching a process
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
72 / 100
Signature
Antivirus / Scanner detection for submitted sample
Disables Windows Defender (via service or powershell)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 298002 Sample: F2okheopG3.exe Startdate: 14/10/2020 Architecture: WINDOWS Score: 72 41 Antivirus / Scanner detection for submitted sample 2->41 43 Multi AV Scanner detection for submitted file 2->43 45 Machine Learning detection for sample 2->45 47 2 other signatures 2->47 8 F2okheopG3.exe 1 2->8         started        process3 file4 39 C:\Users\user\AppData\...\F2okheopG3.exe.log, ASCII 8->39 dropped 49 Injects a PE file into a foreign processes 8->49 12 F2okheopG3.exe 1 1 8->12         started        15 F2okheopG3.exe 8->15         started        signatures5 process6 signatures7 51 Disables Windows Defender (via service or powershell) 12->51 17 powershell.exe 25 12->17         started        19 powershell.exe 21 12->19         started        21 powershell.exe 12->21         started        23 11 other processes 12->23 process8 process9 25 conhost.exe 17->25         started        27 conhost.exe 19->27         started        29 conhost.exe 21->29         started        31 conhost.exe 23->31         started        33 conhost.exe 23->33         started        35 conhost.exe 23->35         started        37 8 other processes 23->37
Threat name:
ByteCode-MSIL.Trojan.Malrep
Status:
Malicious
First seen:
2020-10-14 14:48:07 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Windows security modification
Contains code to disable Windows Defender
Modifies Windows Defender Real-time Protection settings
Unpacked files
SH256 hash:
1398992c75f3040a1244d449a606ca6b5da229de091f90c517b7ea72d28ef68d
MD5 hash:
73a4ae4b03014be2be3a79d1f6cdb8d7
SHA1 hash:
142bd7db6dff255c569c549f3b154434024f6fad
SH256 hash:
0c18b673b8448b0e6a26dd61c260bbf44eef2d63764544b1239162ddbee254ac
MD5 hash:
a22d621ce3d8c026c8ed8b1e9c4f9b60
SHA1 hash:
48bc165453efdb19b5811da4b835cc432ac86ff7
SH256 hash:
a4d4c94763727f84cf68d7765fd6cd21017e34efdb2d1974491d7975947d73f5
MD5 hash:
c78f59a0b6488557704589f7e74efc9b
SHA1 hash:
9d0de70f7c40c6c8c2157d316ca7059df0bf4ad3
SH256 hash:
88e7d1e5414b8fceb396130e98482829eac4bdc78fbc3fe7fb3f4432137e0e03
MD5 hash:
f4b5c1ebf4966256f52c4c4ceae87fb1
SHA1 hash:
ca70ec96d1a65cb2a4cbf4db46042275dc75813b
SH256 hash:
3bed0900c2ba2423e8b4882ef157f017a4f84068bd1f5721c0a7567a13cbb66d
MD5 hash:
592a1f0cf5c3d2c42c4f2edf4ae9d02b
SHA1 hash:
3a17c5efc0b4be3f6fc3e1b5f00aa1acf431d87d
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 3bed0900c2ba2423e8b4882ef157f017a4f84068bd1f5721c0a7567a13cbb66d

(this sample)

Comments