MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 422ccd76531ef169b20dd7ea8540fe553a085d74f9f0b11dfd632289c26ef2c9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 422ccd76531ef169b20dd7ea8540fe553a085d74f9f0b11dfd632289c26ef2c9
SHA3-384 hash: a9dfb8dd62e475f746c81106dd5f3a6187c65393b494493bba199cf73c6a93ec27d2e10ae4d7bc35e1735ba5ca2a416e
SHA1 hash: 29842b95d120243b3ade83e1619963730359c58c
MD5 hash: a47630813e247284db94b02e446a4e5a
humanhash: ack-vermont-sad-ohio
File name:a47630813e247284db94b02e446a4e5a
Download: download sample
File size:192'513 bytes
First seen:2020-11-17 15:39:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b71ae52e8715ee7bfaa0c9df227db54a
ssdeep 3072:WLAFmmAOEdSuNGDzfsqLaEWFUPPG4AdxselHQzkHohpIkuRvZU:WL3/GDypFY6dxscHjoh0U
Threatray 91 similar samples on MalwareBazaar
TLSH 1514CF4D203D9B9CD95D3E7F2CE88267F298FD0CDB6BF66F9D3881931A212656483421
Reporter seifreed

Intelligence


File Origin
# of uploads :
1
# of downloads :
56
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
Replacing executable files
Creating a window
Sending a UDP request
Moving of the original file
Deleting of the original file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Glupteba
Status:
Malicious
First seen:
2020-11-07 19:54:15 UTC
AV detection:
25 of 28 (89.29%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: RenamesItself
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Deletes itself
Loads dropped DLL
Executes dropped EXE
ServiceHost packer
Unpacked files
SH256 hash:
422ccd76531ef169b20dd7ea8540fe553a085d74f9f0b11dfd632289c26ef2c9
MD5 hash:
a47630813e247284db94b02e446a4e5a
SHA1 hash:
29842b95d120243b3ade83e1619963730359c58c
SH256 hash:
9af712753aed1261cf068370b142c67c099938ecf398ed59fa9a395102b568b3
MD5 hash:
98a69a4bf1877a60ec5bdc4b4ec129d9
SHA1 hash:
32c5bf45bc06bf8c9e79b81a75e54260fa4d711e
SH256 hash:
78e2919bb27288e24cbad010f13b52587e6eb7ba005445e4ca2aa82d4bae6b24
MD5 hash:
46cd23fcaf74d8bab4502583a0f2382f
SHA1 hash:
ff857c43e6a5ee87b259b897cea78cae86c2e983
SH256 hash:
dddac9cacfc78e1652b0010c4806f22d16e5abc867e3c8dc5463dadff2881792
MD5 hash:
80ead838038a6cb8a90ed1ed4ff30d46
SHA1 hash:
c6b67f2c8ee19b6d8d274c3f3347b35fdf42a3b7
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments