MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4563e5ab64572adb62bc0e4e6c472b4c6485c9e5af3aa40dc17d84170c442e82. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 4563e5ab64572adb62bc0e4e6c472b4c6485c9e5af3aa40dc17d84170c442e82
SHA3-384 hash: ccb73bb9d4e9e13c01a8749e7a8927bd1365f098954424a24481a9c3f1f7701de64f345f8e0d1fb840ef5eea845a617f
SHA1 hash: 1758ad8c4574dc8aba71ef4e541dd78579853826
MD5 hash: ef7de8e17a46bbb875ff5b48a5111f75
humanhash: oxygen-spring-washington-snake
File name:imgengine.dll
Download: download sample
File size:12'615'680 bytes
First seen:2021-12-18 12:50:39 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 71f86d478ce18ebf5f499dcb0317dd4a
ssdeep 393216:4FRDuf4arU6YVpw/EtYBEUvX78WXl59k:ERDwzrULTlUP78WXlHk
Threatray 1'831 similar samples on MalwareBazaar
TLSH T1B6D633B725C1EAE2CA7973F2AE55244006326ABF19815A21F43F5FE38A8214DF7F1345
Reporter Anonymous
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
130
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for analyzing tools
Searching for the window
Sending a custom TCP request
DNS request
Сreating synchronization primitives
Creating a window
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mekotio packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
Antivirus / Scanner detection for submitted sample
Connects to a pastebin service (likely for C&C)
Hides threads from debuggers
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 541999 Sample: imgengine.dll Startdate: 18/12/2021 Architecture: WINDOWS Score: 92 42 Antivirus / Scanner detection for submitted sample 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 Connects to a pastebin service (likely for C&C) 2->46 48 2 other signatures 2->48 8 loaddll64.exe 1 2->8         started        process3 signatures4 54 Query firmware table information (likely to detect VMs) 8->54 56 Hides threads from debuggers 8->56 58 Tries to detect sandboxes / dynamic malware analysis system (registry check) 8->58 11 rundll32.exe 3 8->11         started        16 cmd.exe 1 8->16         started        18 rundll32.exe 8->18         started        20 6 other processes 8->20 process5 dnsIp6 36 essencialemails.com 187.1.138.5, 443, 49745 IPV6InternetLtdaBR Brazil 11->36 38 edge-block-www-env.dropbox-dns.com 162.125.66.15, 443, 49749 DROPBOXUS United States 11->38 40 4 other IPs or domains 11->40 34 C:\ProgramData\...\9k07bFn.exe, PE32+ 11->34 dropped 60 System process connects to network (likely due to code injection or exploit) 11->60 62 Tries to detect sandboxes and other dynamic analysis tools (window names) 11->62 64 Hides threads from debuggers 11->64 22 rundll32.exe 16->22         started        66 Tries to detect sandboxes / dynamic malware analysis system (registry check) 18->66 file7 signatures8 process9 signatures10 50 Hides threads from debuggers 22->50 52 Tries to detect sandboxes / dynamic malware analysis system (registry check) 22->52 25 WerFault.exe 20 9 22->25         started        28 WerFault.exe 9 22->28         started        process11 file12 30 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 25->30 dropped 32 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 28->32 dropped
Threat name:
Win64.Trojan.Mekotio
Status:
Malicious
First seen:
2021-12-18 12:51:26 UTC
File Type:
PE+ (Dll)
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
evasion themida trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks whether UAC is enabled
Checks BIOS information in registry
Themida packer
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Unpacked files
SH256 hash:
4563e5ab64572adb62bc0e4e6c472b4c6485c9e5af3aa40dc17d84170c442e82
MD5 hash:
ef7de8e17a46bbb875ff5b48a5111f75
SHA1 hash:
1758ad8c4574dc8aba71ef4e541dd78579853826
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_Themida
Author:ditekSHen
Description:Detects executables packed with Themida

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Executable exe 4563e5ab64572adb62bc0e4e6c472b4c6485c9e5af3aa40dc17d84170c442e82

(this sample)

  
Delivery method
Distributed via e-mail link

Comments