MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3e5bde630033fde6d83bbc7b9b12e323c7cfc09b499818d49666559817cd018d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 3e5bde630033fde6d83bbc7b9b12e323c7cfc09b499818d49666559817cd018d
SHA3-384 hash: 03a203590bc637b14302924920133b5f9783854593323c1fbd2c84a105516dcaf132bf91a16a76bf044e5e0b7b94b38d
SHA1 hash: 14eaa3f7697674ae8e06e8c2c860c2c829c2f64a
MD5 hash: 9068fbb20fadf7e380c3e78489a35923
humanhash: virginia-july-foxtrot-johnny
File name:indie game 3.0.exe
Download: download sample
File size:28'471'852 bytes
First seen:2022-04-14 08:40:11 UTC
Last seen:2022-04-20 10:24:18 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 93c6c421fee0148a7bfe63e14db75419
ssdeep 393216:HC92L+FCFKcexAKZofwwuvGvJDOolANSCg4ofs2pVixsU6KvNNJW5iXvkW21B1s7:Q2yF9LARNtzIofsIUf/JWUXvz0BGJ9
Threatray 3 similar samples on MalwareBazaar
TLSH T1CC573313E9F65126D8B10034D4F9862225AD7D3CD722E7D3E6C04FAA79270C3AB756E2
TrID 40.3% (.EXE) Win64 Executable (generic) (10523/12/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4505/5/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon 71ccd2d292c6e470
Reporter tech_skeech
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
418
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
indie game 3.0.exe
Verdict:
Malicious activity
Analysis date:
2022-04-14 08:59:03 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Launching a process
Searching for the window
Сreating synchronization primitives
Creating a file in the %temp% subdirectories
Creating a window
Searching for synchronization primitives
DNS request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware overlay packed remcos shell32.dll zbot
Result
Verdict:
MALICIOUS
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Gathering data
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2022-04-13 20:44:00 UTC
File Type:
PE (Exe)
Extracted files:
15
AV detection:
11 of 41 (26.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 3e5bde630033fde6d83bbc7b9b12e323c7cfc09b499818d49666559817cd018d

(this sample)

  
Delivery method
Distributed via web download

Comments