MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3ccdbf9d5ca1bac3a591a650c1b588dbb335184922c83deb85f8b635e5c307e4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
TeamBot
Vendor detections: 12
| SHA256 hash: | 3ccdbf9d5ca1bac3a591a650c1b588dbb335184922c83deb85f8b635e5c307e4 |
|---|---|
| SHA3-384 hash: | 5dee4aeddf096c188ab67ea0c4ef9efdd44f7088071c0de15def4fcf37b2062608055ec6b161a2798e5c9af927208e3a |
| SHA1 hash: | e2c0d6dbe4ff9c390e2cf2c3a24079a3c4eca4d0 |
| MD5 hash: | ddeea2f3c91fb3e277b9989444903dfb |
| humanhash: | grey-uncle-venus-eight |
| File name: | ddeea2f3c91fb3e277b9989444903dfb.exe |
| Download: | download sample |
| Signature | TeamBot |
| File size: | 726'016 bytes |
| First seen: | 2022-08-19 14:05:34 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f7bff042f521c52809460cf99f02aa1e (2 x RecordBreaker, 1 x TeamBot, 1 x Stop) |
| ssdeep | 12288:pYUlnZEpuGUnZDDjbTUpJExQ38NHTf7SWNMwJ5IOR18D3r66rnjAVR:SoIuGUntcGlb7NMK5R18DbrnjQR |
| Threatray | 1'604 similar samples on MalwareBazaar |
| TLSH | T168F41211F3B0D031E4261D308C65C6A0956FF811EE74D98BFB98A3AB5F707D0AAB6749 |
| TrID | 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 16.4% (.EXE) Win64 Executable (generic) (10523/12/4) 10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.0% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | c01edecea68c8ccc (154 x RedLineStealer, 98 x Smoke Loader, 36 x Stop) |
| Reporter | |
| Tags: | exe TeamBot |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://78.46.129.14/ | https://threatfox.abuse.ch/ioc/844093/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | MALWARE_Win_STOP |
|---|---|
| Author: | ditekSHen |
| Description: | Detects STOP ransomware |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | SUSP_XORed_URL_in_EXE |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | SUSP_XORed_URL_in_EXE_RID2E46 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | win_stop_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.stop. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.