MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 488bf0c238bc463b44031393d299f8959b277b45ac18a09d82f5d1557223ef70. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments 1

SHA256 hash: 488bf0c238bc463b44031393d299f8959b277b45ac18a09d82f5d1557223ef70
SHA3-384 hash: 4b4355d7f9c85ac0eef172c8e239f8f75728e504ad4714a29d309caec060f13c9b825842895ab12a916c02917d09d803
SHA1 hash: 2e32247294f43fac2edcdd1d044c70b398e03905
MD5 hash: 4dadc2245fc209e51d9c22753f5a8eec
humanhash: arizona-triple-asparagus-eleven
File name:4dadc2245fc209e51d9c22753f5a8eec
Download: download sample
File size:12'221'440 bytes
First seen:2021-12-06 12:40:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ef471c0edf1877cd5a881a6a8bf647b9 (74 x Formbook, 33 x Loki, 29 x Loda)
ssdeep 196608:8Qucxpj2Q1QOTR2Xx98YN4cCV7V2qPlAUkT5Nnt8NjLwJ+Dfs:8Qucr20QOAL8YN4cCVE6CUk5GjLwJ+DU
Threatray 1'232 similar samples on MalwareBazaar
TLSH T13AC633991599C73FEBB0387DB1376FA2EFF67C02AB388618179039881CB25169915F34
File icon (PE):PE icon
dhash icon 818da080a0a08082 (5 x Urelas, 2 x RemcosRAT, 1 x DCRat)
Reporter zbetcheckin
Tags:32 exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
164
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
UQD_211116.exe
Verdict:
Malicious activity
Analysis date:
2021-12-06 13:43:41 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
DNS request
Сreating synchronization primitives
Creating a file
Changing a file
Sending an HTTP POST request
Creating a process from a recently created file
Creating a process with a hidden window
Running batch commands
Launching a process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
autoit greyware monero packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
bank.troj.adwa.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Creates an autostart registry key pointing to binary in C:\Windows
Installs a browser helper object (BHO)
Modifies security policies related information
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 534729 Sample: B0q1RzxSOs Startdate: 06/12/2021 Architecture: WINDOWS Score: 100 55 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->55 57 Antivirus / Scanner detection for submitted sample 2->57 59 Multi AV Scanner detection for submitted file 2->59 8 B0q1RzxSOs.exe 23 43 2->8         started        process3 dnsIp4 51 yun.uqidong.com 8->51 41 C:\Users\user\AppData\Local\...\dikgtqn.exe, PE32 8->41 dropped 43 C:\Users\user\AppData\Local\...\qaryoir.exe, PE32 8->43 dropped 45 C:\Users\user\AppData\Local\...\njeliol.exe, PE32 8->45 dropped 47 C:\Users\user\AppData\Local\...\~dqowjap.exe, PE32+ 8->47 dropped 65 Modifies security policies related information 8->65 67 Installs a browser helper object (BHO) 8->67 13 dikgtqn.exe 8 8->13         started        17 qaryoir.exe 8 8->17         started        19 njeliol.exe 8 8->19         started        21 7 other processes 8->21 file5 signatures6 process7 dnsIp8 69 Antivirus detection for dropped file 13->69 71 Multi AV Scanner detection for dropped file 13->71 23 cmd.exe 13->23         started        53 yun.uqidong.com 120.132.17.169, 49768, 49771, 49786 CHINANET-JS-AS-APASNumberforCHINANETjiangsuprovinceba China 21->53 73 Uses ping.exe to sleep 21->73 75 Creates an autostart registry key pointing to binary in C:\Windows 21->75 26 runonce.exe 21->26         started        28 conhost.exe 21->28         started        30 conhost.exe 21->30         started        32 5 other processes 21->32 signatures9 process10 signatures11 61 Uses ping.exe to sleep 23->61 63 Uses ping.exe to check the status of other devices and networks 23->63 34 PING.EXE 23->34         started        37 conhost.exe 23->37         started        39 grpconv.exe 26->39         started        process12 dnsIp13 49 127.0.0.1 unknown unknown 34->49
Threat name:
Win32.Packed.Generic
Status:
Suspicious
First seen:
2021-12-02 07:07:36 UTC
File Type:
PE (Exe)
Extracted files:
12
AV detection:
22 of 28 (78.57%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
adware evasion persistence spyware stealer trojan upx
Behaviour
Checks processor information in registry
Modifies Internet Explorer settings
Modifies Internet Explorer start page
Modifies registry class
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
System policy modification
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Adds Run key to start application
Checks whether UAC is enabled
Drops desktop.ini file(s)
Enumerates connected drives
Installs/modifies Browser Helper Object
Checks computer location settings
Deletes itself
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Drops file in Drivers directory
Executes dropped EXE
UPX packed file
UAC bypass
Unpacked files
SH256 hash:
488bf0c238bc463b44031393d299f8959b277b45ac18a09d82f5d1557223ef70
MD5 hash:
4dadc2245fc209e51d9c22753f5a8eec
SHA1 hash:
2e32247294f43fac2edcdd1d044c70b398e03905
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 488bf0c238bc463b44031393d299f8959b277b45ac18a09d82f5d1557223ef70

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-12-06 12:40:36 UTC

url : hxxp://fd.uqidong.com/UQD/n/UQD_211116.exe