MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 448a14d6ee35da26c5659cf4253d4bcd97737ab502c6195b65d3e14451ab3e0d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PovertyStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 3 File information Comments 1

SHA256 hash: 448a14d6ee35da26c5659cf4253d4bcd97737ab502c6195b65d3e14451ab3e0d
SHA3-384 hash: 7caf0c73052cdf7f15d81d7ea2c1d43de3435acabb57ca90ae0b4dcde77027563e121b13d516924e91761a17165ef2c4
SHA1 hash: fc0cf8466e1175c028e2d26caf7ba6628059e36c
MD5 hash: 20c65c429a3d149bc95caaece5bf8986
humanhash: comet-green-pasta-ten
File name:20c65c429a3d149bc95caaece5bf8986
Download: download sample
Signature PovertyStealer
File size:6'008'096 bytes
First seen:2024-04-06 16:25:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 38966dbabf952346ad06770833ac241e (1 x PovertyStealer)
ssdeep 98304:WtDA1meYKbLw3gx6jVoK5wrcnJecmeNgqwPPJrh13AuyulToWaxIo/Kgp7TnEswU:p1kKXjxLwRnJLwrUuy4TyKg7TnE7Bb49
TLSH T1F35623C49F894460FC8D7EB3EED3716C717D16A5E1DB6C28B4EF4C91A8B2C24603658A
TrID 56.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
11.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
9.0% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.1% (.EXE) Win32 Executable (generic) (4504/4/1)
3.7% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter zbetcheckin
Tags:32 exe PovertyStealer signed

Code Signing Certificate

Organisation:TP-wifi OLD City
Issuer:TP-wifi OLD City
Algorithm:sha512WithRSAEncryption
Valid from:2024-02-15T07:07:31Z
Valid to:2025-11-13T00:00:00Z
Serial number: 17648b705e12b445bf9522e3d4444bb8
Intelligence: 6 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: d2652dc0659f68621e1ccc391e859fa0000a1f7108ee5b7cf5a7c4e844530c62
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
309
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
448a14d6ee35da26c5659cf4253d4bcd97737ab502c6195b65d3e14451ab3e0d.exe
Verdict:
Malicious activity
Analysis date:
2024-04-06 16:26:57 UTC
Tags:
povertystealer stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Reading critical registry keys
Launching a process
Moving a file to the Program Files subdirectory
Replacing files
Stealing user critical data
Connection attempt to an infection source
Sending a TCP request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
crypto overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Poverty Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
96 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Poverty Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Smokeloader
Status:
Malicious
First seen:
2024-04-06 16:26:14 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
17 of 23 (73.91%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
povertystealer
Score:
  10/10
Tags:
family:povertystealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Reads user/profile data of web browsers
Detect Poverty Stealer Payload
Poverty Stealer
Unpacked files
SH256 hash:
6ce1362c99f1e6a21972ee370b1194df5412a23ed57cf261aec2f9f1f1ce7ab9
MD5 hash:
f17dd5286d3983e679274073a193e799
SHA1 hash:
adbe4b5d9bcbd9ea2dbaf47f5da5698950fba7d8
Detections:
MALWARE_Win_PovertyStealer
SH256 hash:
448a14d6ee35da26c5659cf4253d4bcd97737ab502c6195b65d3e14451ab3e0d
MD5 hash:
20c65c429a3d149bc95caaece5bf8986
SHA1 hash:
fc0cf8466e1175c028e2d26caf7ba6628059e36c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PovertyStealer

Executable exe 448a14d6ee35da26c5659cf4253d4bcd97737ab502c6195b65d3e14451ab3e0d

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
DP_APIUses DP APICRYPT32.dll::CryptProtectData
URL_MONIKERS_APICan Download & Execute componentsurlmon.dll::ObtainUserAgentString
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryA

Comments



Avatar
zbet commented on 2024-04-06 16:25:30 UTC

url : hxxp://axsit.biz/images/logo2.jpg