MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 46c40abc6c950d2f5a1543c64dfde2ca02090a21e2fcaa5c447fa2e5043a702b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
N-W0rm
Vendor detections: 17
| SHA256 hash: | 46c40abc6c950d2f5a1543c64dfde2ca02090a21e2fcaa5c447fa2e5043a702b |
|---|---|
| SHA3-384 hash: | 8bbd1d5af9faa5218e10e0ea3643242091fd974dad47783129f7679f8ffc7b21fb3dd37827200e7eeac1e7529d46e069 |
| SHA1 hash: | dd4e240e671307ceb1352629e874dee7a870a122 |
| MD5 hash: | 662efe80470a942e5405f393f251387c |
| humanhash: | violet-gee-six-bluebird |
| File name: | 662efe80470a942e5405f393f251387c.exe |
| Download: | download sample |
| Signature | N-W0rm |
| File size: | 415'232 bytes |
| First seen: | 2023-03-06 11:36:03 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 8def334fa22d316960da4bc7fc2e9343 (2 x Stop, 1 x Smoke Loader, 1 x Gozi) |
| ssdeep | 6144:fkRPLo4zgQnxfWh0IZCS+kXL+llRivL4po1oqrXVk:8s4zBxfK0IZVFL+ll0vL4KrX |
| Threatray | 9 similar samples on MalwareBazaar |
| TLSH | T10E94F1213AD0C472C09712744865CB652B7EB5319B7586CB7B942FFE5F303E0A63A39A |
| TrID | 37.3% (.EXE) Win64 Executable (generic) (10523/12/4) 17.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 16.0% (.EXE) Win32 Executable (generic) (4505/5/1) 7.3% (.ICL) Windows Icons Library (generic) (2059/9) 7.2% (.EXE) OS/2 Executable (generic) (2029/13) |
| File icon (PE): | |
| dhash icon | 10ccccb096945912 (1 x N-W0rm) |
| Reporter | |
| Tags: | exe N-W0rm |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | Windows_Trojan_Smokeloader_3687686f |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.