MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3d990368ceffb435fd2163b10b1b463152d387967de24bd154b627ede96a0326. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: 3d990368ceffb435fd2163b10b1b463152d387967de24bd154b627ede96a0326
SHA3-384 hash: 341332bc47cecd56ebad3fe885d883de55a3e4a108243c84f859ed1b2df31b9715777404a14e08344aae3d8cb12a6caf
SHA1 hash: 5144b51a951b132e5ffde6eebbf35de63e9f2b75
MD5 hash: b2d885727b999b505b91208cafbc1e38
humanhash: magazine-jersey-muppet-missouri
File name:chthonic_2.23.2.0.vir
Download: download sample
Signature Chthonic
File size:235'520 bytes
First seen:2020-07-19 19:40:58 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a2d0ab11b4af9ad63978be583902dec6
ssdeep 3072:vIYHr6cseKYBfaNT3/fu/5GFZkquGl55jgVqnwY:gYHC/Qk7r3Zn
TLSH 803492DC135EE131FF651A3C392369508A91D817A3E29A153D2327CB25629CC7F2EF26
Reporter @tildedennis
Tags:Chthonic


Twitter
@tildedennis
chthonic version 2.23.2.0

Intelligence


File Origin
# of uploads :
1
# of downloads :
18
Origin country :
FR FR
Mail intelligence
No data
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Threat name:
Win32.Trojan.Upatre
Status:
Malicious
First seen:
2016-04-20 10:38:00 UTC
AV detection:
20 of 29 (68.97%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion trojan persistence
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
System policy modification
Modifies Internet Explorer settings
System policy modification
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Checks whether UAC is enabled
Checks whether UAC is enabled
Adds policy Run key to start application
Disables taskbar notifications via registry modification
Adds policy Run key to start application
Disables taskbar notifications via registry modification
UAC bypass
Modifies Windows Defender Real-time Protection settings
UAC bypass
Modifies Windows Defender Real-time Protection settings
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments