MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 46b7366f88fd44a82cd00e4979f676b464c9f7c0169450ff3dcc014d9650b517. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 46b7366f88fd44a82cd00e4979f676b464c9f7c0169450ff3dcc014d9650b517
SHA3-384 hash: 3b76ea033ce0f46e76ba5e35cee54a73d246c2ec843be4d6fb6949c616cb2c8b035188e9b84af3ecc754b96aef5f689d
SHA1 hash: eca99a602e3d731f8ecc23bdf479566c0685c918
MD5 hash: dbe0a497334631b0f7017ec42c20efdc
humanhash: delaware-winner-quiet-tango
File name:16860788551c671273a746f68e2ccdc1e7af013f84ec6bf0f6fbd323f0341d1130eb44e5ca942.dat-decoded
Download: download sample
File size:1'916'928 bytes
First seen:2023-06-06 19:14:17 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
ssdeep 24576:GFlE1xrJfxT1el3KSquRG+Z7Kvodi4I4dyu+QUF0elQKL8INXV9WR1df9Uf:H/Jfx3Y5UFeKvNCJ9Uf
Threatray 78 similar samples on MalwareBazaar
TLSH T143956B05EA92CE27E3E45B7EA153502A9230D6233716BB9F0F7C95793C923B80D523D9
TrID 22.6% (.SCR) Windows screen saver (13097/50/3)
18.1% (.EXE) Win64 Executable (generic) (10523/12/4)
17.2% (.EXE) DOS Borland compiled Executable (generic) (10000/1/2)
11.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
8.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter abuse_ch
Tags:base64-decoded dll


Avatar
abuse_ch
Malware dropped as base64 encoded payload

Intelligence


File Origin
# of uploads :
1
# of downloads :
310
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Gathering data
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
56 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Sigma detected: Execute DLL with spoofed extension
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 882832 Sample: 16860788551c671273a746f68e2... Startdate: 06/06/2023 Architecture: WINDOWS Score: 56 36 Sigma detected: Execute DLL with spoofed extension 2->36 38 .NET source code contains method to dynamically call methods (often used by packers) 2->38 40 .NET source code references suspicious native API functions 2->40 14 loaddll32.exe 1 2->14         started        process3 process4 16 cmd.exe 1 14->16         started        18 conhost.exe 14->18         started        process5 20 rundll32.exe 16->20         started        process6 22 rundll32.exe 20->22         started        process7 24 rundll32.exe 22->24         started        process8 26 rundll32.exe 24->26         started        process9 28 rundll32.exe 26->28         started        process10 30 rundll32.exe 28->30         started        process11 32 rundll32.exe 30->32         started        process12 34 rundll32.exe 32->34         started       
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2023-06-06 19:15:06 UTC
File Type:
PE (.Net Dll)
Extracted files:
1
AV detection:
6 of 36 (16.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
46b7366f88fd44a82cd00e4979f676b464c9f7c0169450ff3dcc014d9650b517
MD5 hash:
dbe0a497334631b0f7017ec42c20efdc
SHA1 hash:
eca99a602e3d731f8ecc23bdf479566c0685c918
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

1c671273a746f68e2ccdc1e7af013f84ec6bf0f6fbd323f0341d1130eb44e5ca

DLL dll 46b7366f88fd44a82cd00e4979f676b464c9f7c0169450ff3dcc014d9650b517

(this sample)

  
Dropped by
SHA256 1c671273a746f68e2ccdc1e7af013f84ec6bf0f6fbd323f0341d1130eb44e5ca
  
Dropped by
MD5 906709d22947c95ab7ef9eba234fbc12
  
Delivery method
Distributed via web download

Comments