MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 47552602c8bee071b42ef171d4b515f2d339d6440b117a7d0e97e0b389a78c06. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: 47552602c8bee071b42ef171d4b515f2d339d6440b117a7d0e97e0b389a78c06
SHA3-384 hash: a13e01037d16856c87419f49ce0493f3f93cf1f75171d964a2db15baab3bd77baf267f6e1c9ec85bc998fc10f86b4d25
SHA1 hash: 5a0240e836988c42a50a37006b48cfcb7b915dea
MD5 hash: caf808250f538b798be8d19b6f706154
humanhash: speaker-nineteen-ink-jupiter
File name:a9faa6ee818ac15f2c9395bbe07ba3f9
Download: download sample
File size:492'366 bytes
First seen:2020-11-17 16:00:47 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3d5396e0e0fb37a5e660408debd9eb67
ssdeep 6144:4/1HMxGYlBxDODrhjDgBejuVMjblfGM99HX/jPS1KRZPyRlf3gG6FPZxT:EswYlBKxDgiuKjbjJXTzangbFP/T
TLSH 91A48D22B6A19437D1632B7CCC5B869C9826BD103D6894463FF95E4C9F79AC0392B3D3
Reporter seifreed

Intelligence


File Origin
# of uploads :
1
# of downloads :
57
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw.evad
Score:
72 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Worm.Soltern
Status:
Malicious
First seen:
2020-11-17 16:08:24 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Unpacked files
SH256 hash:
47552602c8bee071b42ef171d4b515f2d339d6440b117a7d0e97e0b389a78c06
MD5 hash:
caf808250f538b798be8d19b6f706154
SHA1 hash:
5a0240e836988c42a50a37006b48cfcb7b915dea
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Stealer_word_in_memory
Author:James_inthe_box
Description:The actual word stealer in memory

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments