MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3d9e01fa9c58c2eea39c8e2c0c9a70e2fb253a346ecc9763b1d2d1c8e35e607a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Plugx


Vendor detections: 5


Intelligence 5 IOCs YARA 4 File information Comments

SHA256 hash: 3d9e01fa9c58c2eea39c8e2c0c9a70e2fb253a346ecc9763b1d2d1c8e35e607a
SHA3-384 hash: 5e1b6179647ebc9c58ba94b1f2970d57d1d8139273c444f2bc37432f7f984ca8bb33be6579d3e8879406b44a8b9c5a3e
SHA1 hash: f1fa0905c8e4ac6c0fc9f610ecb95cd3d33728f4
MD5 hash: cccb316f1cc5632ad667fcbb15fc3a82
humanhash: pizza-network-massachusetts-texas
File name:3d9e01fa9c58c2eea39c8e2c0c9a70e2fb253a346ecc9763b1d2d1c8e35e607a
Download: download sample
Signature Plugx
File size:74'742 bytes
First seen:2020-06-17 09:36:52 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash bac78d68d76cec273167912251c74570 (241 x Plugx, 3 x SakulaRAT)
ssdeep 768:ZhSksandb4GgyMsp4hyYtoVxYGm1ZAPPsED3VK2+ZtyOjgO4r9vFAg2rq/:ZTsGpehyYtkYvnQYTjipvF2a
Threatray 220 similar samples on MalwareBazaar
TLSH 0E733912B24524F6FB9D8370405B8FE9C2F6BD505EF1406B3BC47B4C1676A688A1BE1E
Reporter JAMESWT_WT
Tags:Plugx

Intelligence


File Origin
# of uploads :
1
# of downloads :
114
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Virus.Hematite
Status:
Malicious
First seen:
2020-06-10 16:02:31 UTC
File Type:
PE (Exe)
AV detection:
28 of 31 (90.32%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:malware_sakula_xorloop
Author:David Cannings
Description:XOR loops from Sakula malware
Rule name:RAT_Sakula
Author:Airbus Defence and Space Cybersecurity CSIRT - Yoann Francou / NCC Group David Cannings
Description:Detects Sakula v1.0 RAT
Reference:http://blog.airbuscybersecurity.com/public/YFR/sakula_v1x.yara
Rule name:ScanBox_Malware_Generic
Author:Florian Roth
Description:Scanbox Chinese Deep Panda APT Malware http://goo.gl/MUUfjv and http://goo.gl/WXUQcP
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments