MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 40afa1e323be151d0d7a38c72f771b0b9e909f49ddade942d4260a5e29e5ec2f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 40afa1e323be151d0d7a38c72f771b0b9e909f49ddade942d4260a5e29e5ec2f
SHA3-384 hash: ecaf321a11fe6da83facc7a978976a44e730a60a3cb547134ba42e113a785c5e0e081a869cbcb35c8733f9cece8ea2a7
SHA1 hash: a7161c8aa8da519759613145cdc086484de32df5
MD5 hash: 974317f8408b77933354de7a175f3ad5
humanhash: east-saturn-alaska-oven
File name:974317f8408b77933354de7a175f3ad5.exe
Download: download sample
File size:282'220 bytes
First seen:2021-02-27 06:51:04 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4d17be67c8d0394c5c1b8e725359ed89 (5 x Adware.Generic, 4 x njrat, 3 x NanoCore)
ssdeep 6144:CRqJ4hy0JeShiY5lfAWRmhmoOrtJ1DNFbSvx8x0RYL:todJeST9Umn3Uvx8ORYL
Threatray 413 similar samples on MalwareBazaar
TLSH 3754018A7590EAE7C1450A328A7146B8EF7F5B2F1D6A2B2F931C1D5B1C73106510FF2A
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
104
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
DNS request
Sending a UDP request
Enabling the 'hidden' option for files in the %temp% directory
Creating a file
Launching the default Windows debugger (dwwin.exe)
Using the Windows Management Instrumentation requests
Sending a custom TCP request
Deleting a recently created file
Reading critical registry keys
Replacing files
Running batch commands
Creating a window
Launching a process
Launching the process to change network settings
Moving a recently created file
Sending an HTTP GET request
Enabling the 'hidden' option for recently created files
Creating a process with a hidden window
Searching for the window
Unauthorized injection to a recently created process
Stealing user critical data
Launching a tool to kill processes
Sending an HTTP GET request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
StormKitty
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Antivirus / Scanner detection for submitted sample
Binary contains a suspicious time stamp
Contains functionality to log keystrokes (.Net Source)
Downloads files with wrong headers with respect to MIME Content-Type
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
May check the online IP address of the machine
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Posts data to a JPG file (protocol mismatch)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Capture Wi-Fi password
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Uses netsh to modify the Windows network and firewall settings
Uses the Telegram API (likely for C&C communication)
Yara detected StormKitty Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 359163 Sample: o1N0Ej5dP0.exe Startdate: 27/02/2021 Architecture: WINDOWS Score: 100 91 Antivirus / Scanner detection for submitted sample 2->91 93 Sigma detected: Capture Wi-Fi password 2->93 95 Multi AV Scanner detection for submitted file 2->95 97 13 other signatures 2->97 9 o1N0Ej5dP0.exe 10 2->9         started        process3 file4 69 C:\Users\user\AppData\...\cmd..2Test.exe, PE32 9->69 dropped 71 C:\Users\user\AppData\...\WindowsApps.exe, PE32 9->71 dropped 12 cmd..2Test.exe 5 9->12         started        16 WindowsApps.exe 15 5 9->16         started        process5 dnsIp6 73 C:\Users\user\AppData\Local\Temp\build.exe, PE32 12->73 dropped 111 Hides that the sample has been downloaded from the Internet (zone.identifier) 12->111 19 build.exe 14 148 12->19         started        77 www.aderojuadelere.com.ng 16->77 79 aderojuadelere.com.ng 198.23.213.114, 49711, 80 AS-COLOCROSSINGUS United States 16->79 81 192.168.2.1 unknown unknown 16->81 75 C:\Users\user\AppData\Local\Temp\down.exe, PE32 16->75 dropped 113 Multi AV Scanner detection for dropped file 16->113 24 down.exe 16->24         started        file7 signatures8 process9 dnsIp10 83 46.138.7.0.in-addr.arpa 19->83 85 api.telegram.org 149.154.167.220, 443, 49714 TELEGRAMRU United Kingdom 19->85 89 4 other IPs or domains 19->89 53 C:\Users\user\AppData\...\SUAVTZKNFL.png, ASCII 19->53 dropped 55 C:\Users\user\AppData\...\MXPXCVPDVN.docx, ASCII 19->55 dropped 57 C:\Users\user\AppData\...\LSBIHQFDVT.xlsx, ASCII 19->57 dropped 59 C:\Users\user\AppData\Local\...\DotNetZip.dll, PE32 19->59 dropped 99 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 19->99 101 Tries to harvest and steal browser information (history, passwords, etc) 19->101 103 Tries to harvest and steal WLAN passwords 19->103 105 Modifies existing user documents (likely ransomware behavior) 19->105 26 cmd.exe 19->26         started        29 cmd.exe 19->29         started        31 cmd.exe 19->31         started        87 trafficbadassery.com 72.52.168.184, 49712, 80 LIQUIDWEBUS United States 24->87 61 C:\ProgramData\vcruntime140.dll, PE32 24->61 dropped 63 C:\ProgramData\sqlite3.dll, PE32 24->63 dropped 65 C:\ProgramData\softokn3.dll, PE32 24->65 dropped 67 4 other files (none is malicious) 24->67 dropped 107 Tries to steal Crypto Currency Wallets 24->107 33 cmd.exe 24->33         started        file11 signatures12 process13 signatures14 109 Tries to harvest and steal WLAN passwords 26->109 35 conhost.exe 26->35         started        37 chcp.com 26->37         started        39 netsh.exe 26->39         started        41 findstr.exe 26->41         started        49 4 other processes 29->49 43 conhost.exe 31->43         started        45 chcp.com 31->45         started        47 netsh.exe 31->47         started        51 2 other processes 33->51 process15
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-02-27 04:17:00 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware
Behaviour
Delays execution with timeout.exe
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops desktop.ini file(s)
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Unpacked files
SH256 hash:
a56508a041a5b5870578d9f5a1db6ec7186a74a50b391bd6506e9b62022bdf2e
MD5 hash:
198d38f9365499a5b3d62682b6c5afec
SHA1 hash:
cdeb1cbfafdeef9749f5994608f454e04ce6e6b3
SH256 hash:
00818933dfd4df43baffa3a119db981848415ca60a5e9e34184da64001fa72da
MD5 hash:
76b03c5fb5f3ac357211d0cee3e72291
SHA1 hash:
8a4d0384fe6db8a4e7186ed5ad9215edb09365da
SH256 hash:
fc58db92b69fc17bbce2c1dccdfa5bffa3abeadf6b6b188ed0f930ea3d3e637b
MD5 hash:
8dc06e7ad18391c1390fdea6891ea7db
SHA1 hash:
185f9e991544115a65d729f12a68deeccc442bd3
SH256 hash:
b0eb259851ec526818f7ea6789e81c418622a062d3ad314faa109f9ca3b1e0d9
MD5 hash:
8ae1fb5855778a77fdef9363ced09a0a
SHA1 hash:
76f0d6c4aba568ea0b8d7e18e898d4e0c15ddb25
SH256 hash:
40afa1e323be151d0d7a38c72f771b0b9e909f49ddade942d4260a5e29e5ec2f
MD5 hash:
974317f8408b77933354de7a175f3ad5
SHA1 hash:
a7161c8aa8da519759613145cdc086484de32df5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 40afa1e323be151d0d7a38c72f771b0b9e909f49ddade942d4260a5e29e5ec2f

(this sample)

  
Delivery method
Distributed via web download

Comments