MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3ca1c11c2d4173581e8007b955c912dd1d6abdb1bafe03924aca8cba437df745. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Worm.m0yv


Vendor detections: 16


Intelligence 16 IOCs YARA 6 File information Comments

SHA256 hash: 3ca1c11c2d4173581e8007b955c912dd1d6abdb1bafe03924aca8cba437df745
SHA3-384 hash: 2ecca8917911091d4677ebf42ecf4c8833ae0997c62fb7774da325e675f20b4e80c5ab29d70ec9a1b6bd5cc000e1f333
SHA1 hash: 7359e8d92749a87655654a04671239dc7f300af9
MD5 hash: fa7dcecb3c5ac81610c93c6b91cda38a
humanhash: april-kitten-pennsylvania-edward
File name:Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe
Download: download sample
Signature Worm.m0yv
File size:2'267'136 bytes
First seen:2024-11-28 17:18:44 UTC
Last seen:2024-11-28 21:42:30 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 3d95adbf13bbe79dc24dccb401c12091 (881 x AgentTesla, 737 x FormBook, 236 x SnakeKeylogger)
ssdeep 49152:5Vg5tQ7a/K+TKq8mFmM1I3Dxei0IqfDX40EaY8A5:Hg56lWF31I3D4i0vfDX40E
TLSH T1ACA5012363DDC261C3B25173BA65B741AEBF782506A5F96B2FD8093DFD20122520E673
TrID 68.8% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
12.5% (.EXE) Win64 Executable (generic) (10522/11/4)
6.0% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.4% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
File icon (PE):PE icon
dhash icon aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla)
Reporter abuse_ch
Tags:exe geo TUR Worm.m0yv ZiraatBank

Intelligence


File Origin
# of uploads :
2
# of downloads :
407
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
145388 EUR Swift Bildirimi (1.73 MB).msg
Verdict:
Malicious activity
Analysis date:
2024-11-28 16:25:12 UTC
Tags:
attachments attc-unc arch-exec

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
autorun autoit emotet spam
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Creating a file
Creating a process from a recently created file
Launching a process
Сreating synchronization primitives
Creating a file in the %AppData% directory
Modifying an executable file
Launching a service
Searching for synchronization primitives
Modifying a system executable file
Creating a file in the Windows subdirectories
Connection attempt to an infection source
Loading a system driver
Modifying a system file
DNS request
Creating a file in the %AppData% subdirectories
Connection attempt
Sending an HTTP GET request
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Running batch commands
Enabling autorun with the shell\open\command registry branches
Enabling autorun for a service
Query of malicious DNS domain
Unauthorized injection to a recently created process
Stealing user critical data
Enabling autorun by creating a file
Unauthorized injection to a system process
Infecting executable files
Sending an HTTP POST request to an infection source
Adding an exclusion to Microsoft Defender
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
autoit compiled-script evasive fingerprint fingerprint keylogger lolbin microsoft_visual_cc msconfig packed packed packer_detected
Result
Threat name:
AgentTesla, MassLogger RAT, PureLog Stea
Detection:
malicious
Classification:
spre.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large strings
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Antivirus detection for dropped file
Binary is likely a compiled AutoIt script file
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Drops executable to a common third party application directory
Drops VBS files to the startup folder
Found malware configuration
Infects executable files (exe, dll, sys, html)
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Drops script at startup location
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
System process connects to network (likely due to code injection or exploit)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected Generic Downloader
Yara detected MassLogger RAT
Yara detected PureLog Stealer
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1564711 Sample: Ziraat_Bankasi_Swift_Mesaji... Startdate: 28/11/2024 Architecture: WINDOWS Score: 100 95 reallyfreegeoip.org 2->95 97 ssbzmoy.biz 2->97 99 7 other IPs or domains 2->99 121 Suricata IDS alerts for network traffic 2->121 123 Found malware configuration 2->123 125 Malicious sample detected (through community Yara rule) 2->125 129 19 other signatures 2->129 12 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 4 2->12         started        16 wscript.exe 2->16         started        18 TrojanAIbot.exe 2->18         started        20 2 other processes 2->20 signatures3 127 Tries to detect the country of the analysis system (by using the IP) 95->127 process4 file5 85 C:\Users\user\AppData\Local\...\spadixes.exe, PE32 12->85 dropped 159 Antivirus detection for dropped file 12->159 161 Binary is likely a compiled AutoIt script file 12->161 163 Machine Learning detection for dropped file 12->163 22 spadixes.exe 2 12->22         started        165 Windows Scripting host queries suspicious COM object (likely to drop second stage) 16->165 26 spadixes.exe 16->26         started        167 Multi AV Scanner detection for dropped file 18->167 signatures6 process7 file8 79 C:\Users\user\AppData\...\spadixes.vbs, data 22->79 dropped 149 Antivirus detection for dropped file 22->149 151 Binary is likely a compiled AutoIt script file 22->151 153 Machine Learning detection for dropped file 22->153 155 4 other signatures 22->155 28 svchost.exe 8 22->28         started        32 spadixes.exe 26->32         started        34 svchost.exe 26->34         started        signatures9 process10 file11 87 C:\Windows\System32\alg.exe, PE32+ 28->87 dropped 89 C:\Users\user\AppData\Local\...\server02.exe, PE32 28->89 dropped 91 C:\Users\user\AppData\Local\...\neworigin.exe, PE32 28->91 dropped 93 2 other malicious files 28->93 dropped 169 Drops executable to a common third party application directory 28->169 171 Infects executable files (exe, dll, sys, html) 28->171 36 neworigin.exe 14 2 28->36         started        40 TrojanAI.exe 7 28->40         started        43 server02.exe 15 2 28->43         started        173 Binary is likely a compiled AutoIt script file 32->173 45 spadixes.exe 32->45         started        47 svchost.exe 32->47         started        signatures12 process13 dnsIp14 101 s82.gocheapweb.com 51.195.88.199, 49705, 49716, 49930 OVHFR France 36->101 103 api.ipify.org 172.67.74.152, 443, 49702 CLOUDFLARENETUS United States 36->103 131 Antivirus detection for dropped file 36->131 133 Multi AV Scanner detection for dropped file 36->133 135 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 36->135 147 4 other signatures 36->147 81 C:\Users\user\AppData\...\TrojanAIbot.exe, PE32 40->81 dropped 137 Machine Learning detection for dropped file 40->137 139 Uses schtasks.exe or at.exe to add and modify task schedules 40->139 141 Adds a directory exclusion to Windows Defender 40->141 49 powershell.exe 40->49         started        52 cmd.exe 40->52         started        54 schtasks.exe 40->54         started        56 TrojanAIbot.exe 40->56         started        105 checkip.dyndns.com 132.226.8.169, 49701, 80 UTMEMUS United States 43->105 107 reallyfreegeoip.org 172.67.177.134, 443, 49704 CLOUDFLARENETUS United States 43->107 143 Tries to steal Mail credentials (via file / registry access) 43->143 145 Binary is likely a compiled AutoIt script file 45->145 58 spadixes.exe 45->58         started        60 svchost.exe 45->60         started        file15 signatures16 process17 signatures18 113 Loading BitLocker PowerShell Module 49->113 62 conhost.exe 49->62         started        64 WmiPrvSE.exe 49->64         started        66 conhost.exe 52->66         started        68 timeout.exe 52->68         started        70 conhost.exe 54->70         started        115 Binary is likely a compiled AutoIt script file 58->115 117 Writes to foreign memory regions 58->117 119 Maps a DLL or memory area into another process 58->119 72 svchost.exe 58->72         started        process19 dnsIp20 109 ssbzmoy.biz 18.141.10.107, 49745, 80 AMAZON-02US United States 72->109 111 pywolwnvd.biz 54.244.188.177, 49738, 49753, 80 AMAZON-02US United States 72->111 83 Ziraat_Bankasi_Swi...esaji_BXB04958T.exe, PE32 72->83 dropped 157 System process connects to network (likely due to code injection or exploit) 72->157 77 TrojanAI.exe 72->77         started        file21 signatures22 process23
Threat name:
Win32.Trojan.AutoitInject
Status:
Malicious
First seen:
2024-11-28 17:19:06 UTC
File Type:
PE (Exe)
Extracted files:
27
AV detection:
16 of 38 (42.11%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
agenttesla_v4 404keylogger autoit unknown_loader_036 agenttesla expiro snakekeylogger
Similar samples:
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection discovery execution keylogger spyware stealer trojan
Behaviour
Delays execution with timeout.exe
Modifies data under HKEY_USERS
Scheduled Task/Job: Scheduled Task
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
AutoIT Executable
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads WinSCP keys stored on the system
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Command and Scripting Interpreter: PowerShell
AgentTesla
Agenttesla family
Unpacked files
SH256 hash:
abdd6f31a909b0b10e30ced74a1f6f037adf1f61a8a842048dbc254d6f076169
MD5 hash:
c33a7f0e25bb3f4d3c19fc8441e9d12b
SHA1 hash:
0286b277e97b9f7c217a0d029e8144f8e20b40b9
SH256 hash:
36fe89b3218d2d0bbf865967cdc01b9004e3ba13269909e3d24d7ff209f28fc5
MD5 hash:
50d015016f20da0905fd5b37d7834823
SHA1 hash:
6c39c84acf3616a12ae179715a3369c4e3543541
SH256 hash:
53406cb7d67e3d71e30ad41aff5a31b75652624a8641e0ea05f31650abd3fe42
MD5 hash:
d49b97c9900da1344e4e8481551cc14c
SHA1 hash:
53c7014eb195741a40b1d8ca061945fde2aa567f
Detections:
win_masslogger_w0 win_404keylogger_g1 INDICATOR_SUSPICIOUS_EXE_TelegramChatBot MAL_Envrial_Jan18_1 INDICATOR_SUSPICIOUS_Binary_References_Browsers
SH256 hash:
bad95a53aac83239703427c874079ab244d7efc43a77137c45114796d91c6d37
MD5 hash:
2f52f8f2b7ee38b88cedb2974c54969e
SHA1 hash:
40d2d1b1b8d6a07cc4ec0000ced4d2d5f8ac9283
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24 RedLine_Campaign_June2021
SH256 hash:
dc441006cb45c2cfac6c521f6cd4c16860615d21081563bd9e368de6f7e8ab6b
MD5 hash:
d6a4cf0966d24c1ea836ba9a899751e5
SHA1 hash:
392d68c000137b8039155df6bb331d643909e7e7
Detections:
AgentTesla win_agent_tesla_g2 INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients Agenttesla_type2 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
SH256 hash:
7eee21b05c8eada640149dd5143d38cf25252c70bec2f2d81feaeed946fe4cb3
MD5 hash:
a837500a455eecb366215e73bda08225
SHA1 hash:
26896fa9116aaf47a2f34937ddda06f7dec72492
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
9a7757116787f85990f044f174592108aaafecf103d2a0024b8783962a391d78
MD5 hash:
31f792b09ce3330123ca7aeab466a05f
SHA1 hash:
f1fe823d99c234fd11617d37ab59efa5468503e3
Detections:
MAL_Malware_Imphash_Mar23_1 MALWARE_Win_RedLine SUSP_OBF_NET_Reactor_Native_Stub_Jan24
SH256 hash:
599e0f9fc098cb2ee5606b6855e2efd490d34e3468d39f09c2e87d33ec160a5d
MD5 hash:
0f32ed3be3c7cff20e988463e54ba94b
SHA1 hash:
bb77a73875b9fac83218295b5134a9f69a54ebeb
Detections:
MAL_Malware_Imphash_Mar23_1 MALWARE_Win_RedLine SUSP_OBF_NET_Reactor_Native_Stub_Jan24
SH256 hash:
3ca1c11c2d4173581e8007b955c912dd1d6abdb1bafe03924aca8cba437df745
MD5 hash:
fa7dcecb3c5ac81610c93c6b91cda38a
SHA1 hash:
7359e8d92749a87655654a04671239dc7f300af9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:RansomPyShield_Antiransomware
Author:XiAnzheng
Description:Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:YahLover
Author:Kevin Falcoz
Description:YahLover

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::AllocateAndInitializeSid
ADVAPI32.dll::CopySid
ADVAPI32.dll::FreeSid
ADVAPI32.dll::GetLengthSid
ADVAPI32.dll::GetTokenInformation
ADVAPI32.dll::GetAce
COM_BASE_APICan Download & Execute componentsole32.dll::CLSIDFromProgID
ole32.dll::CoCreateInstance
ole32.dll::CoCreateInstanceEx
ole32.dll::CoInitializeSecurity
ole32.dll::CreateStreamOnHGlobal
MULTIMEDIA_APICan Play MultimediaWINMM.dll::mciSendStringW
WINMM.dll::timeGetTime
WINMM.dll::waveOutSetVolume
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AddAce
ADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::CheckTokenMembership
ADVAPI32.dll::DuplicateTokenEx
ADVAPI32.dll::GetAclInformation
ADVAPI32.dll::GetSecurityDescriptorDacl
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteExW
SHELL32.dll::ShellExecuteW
SHELL32.dll::SHFileOperationW
WIN32_PROCESS_APICan Create Process and ThreadsADVAPI32.dll::CreateProcessAsUserW
KERNEL32.dll::CreateProcessW
ADVAPI32.dll::CreateProcessWithLogonW
KERNEL32.dll::OpenProcess
ADVAPI32.dll::OpenProcessToken
ADVAPI32.dll::OpenThreadToken
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::SetSystemPowerState
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetDriveTypeW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileW
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateHardLinkW
IPHLPAPI.DLL::IcmpCreateFile
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
WIN_BASE_USER_APIRetrieves Account InformationKERNEL32.dll::GetComputerNameW
ADVAPI32.dll::GetUserNameW
ADVAPI32.dll::LogonUserW
ADVAPI32.dll::LookupPrivilegeValueW
WIN_NETWORK_APISupports Windows NetworkingMPR.dll::WNetAddConnection2W
MPR.dll::WNetUseConnectionW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegConnectRegistryW
ADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::BlockInput
USER32.dll::CloseDesktop
USER32.dll::CreateMenu
USER32.dll::EmptyClipboard
USER32.dll::FindWindowExW
USER32.dll::FindWindowW

Comments