MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3eb739c596cb3da0dff3a6f345fe95de936df913810402a7ed923d33b338aec0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stop
Vendor detections: 18
| SHA256 hash: | 3eb739c596cb3da0dff3a6f345fe95de936df913810402a7ed923d33b338aec0 |
|---|---|
| SHA3-384 hash: | cdd248924b9429db43bfab1b4001cafa2e6d4767ff8027bdd2ac62646fc4a5bf04cb7f1d05f12a4d9cb359a4392f9dfe |
| SHA1 hash: | 9f8f781ff6fdb19592c6a9254579c7d08cab7bf5 |
| MD5 hash: | 991dd933acfdcc78d447a4a674c63fd6 |
| humanhash: | quebec-michigan-don-mountain |
| File name: | setup.exe |
| Download: | download sample |
| Signature | Stop |
| File size: | 710'144 bytes |
| First seen: | 2023-04-04 01:21:07 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | e29976161a141f5f92fe5bca09916305 (5 x Stop, 2 x Rhadamanthys, 1 x Amadey) |
| ssdeep | 12288:Zg1ekPJGkvxSl8a8sBcvHG9NlISYuelmR9rsLluYZXlMzjaVbS:Zg1jPYkvxSGv2nTnRlsL1xlMnI2 |
| TLSH | T13EE41221F6A284BBC443943909E5DAA54E3FBD729B7A8EC723105B3D2D316C1867D31E |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 0010486121613111 (1 x Stop) |
| Reporter | |
| Tags: | exe Stop |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
https://steamcommunity.com/profiles/76561199489580435
https://t.me/tabootalks
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | MALWARE_Win_STOP |
|---|---|
| Author: | ditekSHen |
| Description: | Detects STOP ransomware |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | Suspicious_Macro_Presence |
|---|---|
| Author: | Mehmet Ali Kerimoglu (CYB3RMX) |
| Description: | This rule detects common malicious/suspicious implementations. |
| Rule name: | SUSP_XORed_URL_in_EXE |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | SUSP_XORed_URL_in_EXE_RID2E46 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | Windows_Ransomware_Stop_1e8d48ff |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_stop_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.stop. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.