MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 40f6ef54f565857eedc2823d556b6e48f446526b2f8e490f473d79c5b8534849. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Worm.Virut


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: 40f6ef54f565857eedc2823d556b6e48f446526b2f8e490f473d79c5b8534849
SHA3-384 hash: a904bf971bbd1b4813d4bd028bc7af282a39a053fa143efe17a34f37ae7031330091b510a37ecbbb3f1593b656897ba5
SHA1 hash: 604062584e143463a70816386cfe54412bce7059
MD5 hash: fe54029d55e98a8e9aed9730d65243d0
humanhash: iowa-mexico-juliet-connecticut
File name:Virus.Win32.Nimnul.a-40f6ef54f565857eedc2823d556b6e48f446526b2f8e490f473d79c5b8534849
Download: download sample
Signature Worm.Virut
File size:523'122 bytes
First seen:2022-08-31 02:15:52 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7faedebf43a98dcd3e0644d88a8391cb (1 x Worm.Virut, 1 x Worm.Ramnit)
ssdeep 12288:W4dNeMEumiULIoPDiV4qWW5b+FXZ/becJ+G9:WniVPhSRZyW
TLSH T1B5B401C078C1FE65E28AD277F5BF5D2A56868C1DDCDC2B2A5084300A3BDFAD12791927
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4505/5/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon f8697868b2f069d4 (5 x DarkVisionRAT, 1 x Worm.Virut, 1 x Emmenhtal)
Reporter OSimao
Tags:exe Worm.Virut

Intelligence


File Origin
# of uploads :
1
# of downloads :
217
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Creating a process from a recently created file
Сreating synchronization primitives
Unauthorized injection to a recently created process
Creating a file in the Program Files subdirectories
Changing a file
Searching for synchronization primitives
Launching a process
Creating a window
Searching for the window
Blocking the Windows Security Center notifications
Blocking the User Account Control
Firewall traversal
Unauthorized injection to a system process
Query of malicious DNS domain
Enabling a "Do not show hidden files" option
Unauthorized injection to a browser process
Enabling autorun with system ini files
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed
Result
Verdict:
MALICIOUS
Result
Threat name:
Ramnit, Sality, Virut
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Worm.Ramnit
Status:
Malicious
First seen:
2014-05-26 20:28:00 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
28 of 29 (96.55%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:sality backdoor evasion trojan upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
System policy modification
Drops file in Program Files directory
Drops file in Windows directory
Checks whether UAC is enabled
Loads dropped DLL
Windows security modification
Drops file in Drivers directory
Executes dropped EXE
UPX packed file
Modifies firewall policy service
Sality
UAC bypass
Windows security bypass
Malware Config
C2 Extraction:
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Unpacked files
SH256 hash:
d7724f7dcbfa432d4236902ea46d6ccf63f3f1a3e9b1582a9a48f6ae149150df
MD5 hash:
ba2d1c78c4b3b3fc35770749e9ad5f86
SHA1 hash:
888ba69f247886d09274bf4833e17b5e302a607d
Detections:
win_ramnit_g0 win_ramnit_g1 win_ramnit_auto
SH256 hash:
1ab69d9ad75d58e10c83a38d56ae028e57a94decc9da9515f4341036a0ea1efb
MD5 hash:
ccd57c2af60720f5c93ea3aec7fcde69
SHA1 hash:
c872cd2dd63a9eb195445ee84d692bf9841ac1c9
Detections:
win_ramnit_g0 win_ramnit_g1 win_ramnit_auto
SH256 hash:
dd041821e180423250027f2c7a22a6514786f904c2a984baaeb33be72f68b684
MD5 hash:
51b596e74dd95131d3200c3c3693d02c
SHA1 hash:
2de29f5c83d61bbdf15fe4369c0a1a56c9dd3a02
Detections:
win_ramnit_g0 win_ramnit_auto
SH256 hash:
40f6ef54f565857eedc2823d556b6e48f446526b2f8e490f473d79c5b8534849
MD5 hash:
fe54029d55e98a8e9aed9730d65243d0
SHA1 hash:
604062584e143463a70816386cfe54412bce7059
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:win_sality_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.sality.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments