MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3ed42a44bf854a9a2469018ea42c475cf4982f5a8b7fb6a1e0a7d808361b9403. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments 1

SHA256 hash: 3ed42a44bf854a9a2469018ea42c475cf4982f5a8b7fb6a1e0a7d808361b9403
SHA3-384 hash: 6bfeb4c43508d234f3ed1f456d80dfba88c206e1e7bf2bae689f2cbff666c48ce4954e7c97628afe32d6c68cf96883ba
SHA1 hash: 4e89941a884bf21f1b501ea9da8c4f9788d5f5f0
MD5 hash: 90554b45e38190ee46125e373d43621d
humanhash: jupiter-fruit-wyoming-crazy
File name:PtQqRL_FSpokaQGOpCxHXPSYL1qLf7ah4KfYCDYblAM.bin
Download: download sample
File size:15'715'920 bytes
First seen:2022-10-31 15:15:53 UTC
Last seen:2022-10-31 17:15:20 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c37e09c5b0695a85a9bc5acc3c3be323
ssdeep 393216:rBFClEpWJKlh2pQtaL/dPG2yLTtPGVcowR:rPClk+IQp1Je2yLTtPyco
Threatray 228 similar samples on MalwareBazaar
TLSH T172F633006AA046FBF879503AD472890365FA75AF1F71C49BDA6012622F93FE27F34B51
TrID 48.7% (.EXE) Win64 Executable (generic) (10523/12/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon c6c2ccc4f4e0e0f8 (37 x PythonStealer, 21 x CrealStealer, 19 x Empyrean)
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
263
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PtQqRL_FSpokaQGOpCxHXPSYL1qLf7ah4KfYCDYblAM.bin
Verdict:
No threats detected
Analysis date:
2022-10-31 15:17:47 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a file
DNS request
Sending a custom TCP request
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed
Result
Verdict:
MALICIOUS
Malware family:
ElevenClock
Verdict:
Suspicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
48 / 100
Signature
Contains functionality to infect the boot sector
Hides threads from debuggers
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2022-10-31 15:17:00 UTC
File Type:
PE+ (Exe)
Extracted files:
1375
AV detection:
6 of 26 (23.08%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
pyinstaller
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of NtSetInformationThreadHideFromDebugger
Loads dropped DLL
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
3ed42a44bf854a9a2469018ea42c475cf4982f5a8b7fb6a1e0a7d808361b9403
MD5 hash:
90554b45e38190ee46125e373d43621d
SHA1 hash:
4e89941a884bf21f1b501ea9da8c4f9788d5f5f0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:PyInstaller
Author:@bartblaze
Description:Identifies executable converted using PyInstaller.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
Bry commented on 2022-10-31 16:04:17 UTC

https://twitter.com/bry_campbell/status/1587080829724868615?s=20&t=fgyQ0HfNAZIfnmfLYlESxw