MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4444458bf47925c82431843fd147aabbfbee71ca849fc711cb69b0cea01f4747. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 4444458bf47925c82431843fd147aabbfbee71ca849fc711cb69b0cea01f4747
SHA3-384 hash: 909f37b141b5387aec433970071f42fa48da855018fce64dab7b4f7daa07c7539853c42603b0e64c9e70f0ccd04ba15f
SHA1 hash: 230aa8c348dcfa88698d2aaaae694d623c19b76b
MD5 hash: 956090ecfd9dc1986e4ae0afd782c1d3
humanhash: pennsylvania-cold-india-india
File name:4444458bf47925c82431843fd147aabbfbee71ca849fc711cb69b0cea01f4747.bin
Download: download sample
File size:1'521'256 bytes
First seen:2020-09-14 09:04:01 UTC
Last seen:2020-09-14 09:46:33 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 517a4c849003d4c3cfe0b745534d0d6e
ssdeep 24576:5pitYuAnu1YrnjyMd2uCdLkT0TChyDUgyvkW8ZRGyzE:GD1Y6Md2uCdC0TChjbvk5RGWE
Threatray 1 similar samples on MalwareBazaar
TLSH E4650940F241D972E8962BB2993ADD61502ABE3C4735479F728D3B3A1BF33C21176E49
Reporter Anonymous

Intelligence


File Origin
# of uploads :
2
# of downloads :
79
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Unauthorized injection to a recently created process
Running batch commands
Sending a UDP request
Launching a process
Result
Threat name:
Unknown
Detection:
malicious
Classification:
rans.evad
Score:
76 / 100
Signature
Contains functionality to hide the console window
Contains functionality to inject code into remote processes
Contains functionalty to change the wallpaper
Disables Windows Defender (via service or powershell)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Uses cmd line tools excessively to alter registry or file data
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 284974 Sample: ICLeXYvc9O.bin Startdate: 14/09/2020 Architecture: WINDOWS Score: 76 47 Multi AV Scanner detection for submitted file 2->47 49 Machine Learning detection for sample 2->49 51 Disables Windows Defender (via service or powershell) 2->51 9 ICLeXYvc9O.exe 1 2->9         started        process3 signatures4 55 Contains functionalty to change the wallpaper 9->55 57 Contains functionality to inject code into remote processes 9->57 59 Contains functionality to hide the console window 9->59 61 Injects a PE file into a foreign processes 9->61 12 ICLeXYvc9O.exe 6 9->12         started        15 conhost.exe 9->15         started        process5 signatures6 65 Disables Windows Defender (via service or powershell) 12->65 17 cmd.exe 12->17         started        19 cmd.exe 12->19         started        21 cmd.exe 12->21         started        23 12 other processes 12->23 process7 signatures8 26 powershell.exe 17->26         started        29 powershell.exe 19->29         started        31 powershell.exe 21->31         started        53 Disables Windows Defender (via service or powershell) 23->53 33 powershell.exe 1 21 23->33         started        35 powershell.exe 22 23->35         started        37 powershell.exe 1 22 23->37         started        39 8 other processes 23->39 process9 signatures10 63 Uses cmd line tools excessively to alter registry or file data 26->63 41 reg.exe 26->41         started        43 reg.exe 29->43         started        45 reg.exe 31->45         started        process11
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2020-09-13 19:45:01 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
persistence ransomware spyware
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Interacts with shadow copies
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Modifies service
Suspicious use of SetThreadContext
Enumerates connected drives
Reads user/profile data of web browsers
Blacklisted process makes network request
Deletes shadow copies
ServiceHost packer
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments