MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4432dedd4db9c2f1f554cb9fc4317196051ca8dc405231e2bd1bc9845702a872. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Neurevt


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: 4432dedd4db9c2f1f554cb9fc4317196051ca8dc405231e2bd1bc9845702a872
SHA3-384 hash: 94e29dbb71220b4b060986901ae803706051f0f4bace7937c9e4166714695f73b787df353b2cb90c6840ebf8bd0ef25c
SHA1 hash: 042c3f1f2675d30f3394243db9a1aaeba7e1e87e
MD5 hash: ca2435bf28a9f678e7f2136cfc52cfcb
humanhash: potato-uniform-paris-indigo
File name:SARS Suspected Fraudulent Transaction report001288.PDF.exe
Download: download sample
Signature Neurevt
File size:323'584 bytes
First seen:2020-07-24 07:49:49 UTC
Last seen:2020-07-24 09:06:40 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e1b8b702bc7f49fd4982cfa5521ecbba (2 x Neurevt)
ssdeep 6144:JCksqZZqB8gAmHnBR6sPm2zZZUh+Zbf3/a1PXtozPLwr9wX+XlDX/:DstBnAmHBRBzztbfYczwreXgD
TLSH 7E6401D57580C871C3890934783AE6F62AFCBDB14A644903B7A57B6B6E323E3557B302
Reporter abuse_ch
Tags:COVID-19 exe Neurevt


Avatar
abuse_ch
Malspam distributing Neurevt:

HELO: slot0.devlinscigars.biz
Sending IP: 104.168.176.75
From: order@keydistributors.co.za
Subject: Purchase Order POKD006192
Attachment: SARS Suspected Fraudulent Transaction report 001288.PDF.gz (contains "SARS Suspected Fraudulent Transaction report 001288.PDF.exe")

Neurevt C2:
http://winqits.com/~zadmin/lk/dm/logout.php

Intelligence


File Origin
# of uploads :
2
# of downloads :
97
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Launching a process
Launching a service
Creating a window
Unauthorized injection to a browser process
Searching for analyzing tools
Searching for the window
Connection attempt
Setting browser functions hooks
Moving of the original file
Enabling autorun for a service
Firewall traversal
Setting a single autorun event
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Changing settings of the browser security zones
Unauthorized injection to a system process
Enabling autorun
Result
Threat name:
Unknown
Detection:
malicious
Classification:
phis.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 250640 Sample: SARS Suspected Fraudulent T... Startdate: 24/07/2020 Architecture: WINDOWS Score: 100 39 Antivirus / Scanner detection for submitted sample 2->39 41 Detected unpacking (changes PE section rights) 2->41 43 Detected unpacking (overwrites its own PE header) 2->43 45 7 other signatures 2->45 7 SARS Suspected Fraudulent Transaction report001288.PDF.exe 12 25 2->7         started        10 97e199c7i3se7.exe 23 2->10         started        12 97e199c7i3se7.exe 2->12         started        14 2 other processes 2->14 process3 signatures4 51 Creates an undocumented autostart registry key 7->51 53 Maps a DLL or memory area into another process 7->53 55 Sample uses process hollowing technique 7->55 57 Hides that the sample has been downloaded from the Internet (zone.identifier) 7->57 16 explorer.exe 9 39 7->16         started        59 Hides threads from debuggers 10->59 process5 dnsIp6 29 winqits.com 84.38.180.51, 49737, 49738, 49739 SELECTELRU Russian Federation 16->29 31 System process connects to network (likely due to code injection or exploit) 16->31 33 Changes memory attributes in foreign processes to executable or writable 16->33 35 Overwrites Windows DLL code with PUSH RET codes 16->35 37 5 other signatures 16->37 20 CUNsclGcimK.exe 1 23 16->20 injected 23 CUNsclGcimK.exe 1 23 16->23 injected 25 CUNsclGcimK.exe 1 23 16->25 injected 27 9 other processes 16->27 signatures7 process8 signatures9 47 Hides threads from debuggers 20->47 49 Hides that the sample has been downloaded from the Internet (zone.identifier) 20->49
Threat name:
Win32.Trojan.Glubpteba
Status:
Malicious
First seen:
2020-07-24 07:42:35 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
betabot
Score:
  10/10
Tags:
evasion trojan backdoor botnet family:betabot
Behaviour
Checks processor information in registry
Suspicious use of AdjustPrivilegeToken
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks whether UAC is enabled
BetaBot
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_betabot_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_betabot_w0
Author:Venom23
Description:Neurevt Malware Sig

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Neurevt

Executable exe 4432dedd4db9c2f1f554cb9fc4317196051ca8dc405231e2bd1bc9845702a872

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments