MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4b35a2e57b7f2b3eca1ddb2c2ebc678af68f7046e06bcf3e3b389f95ea6d7f14. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 4b35a2e57b7f2b3eca1ddb2c2ebc678af68f7046e06bcf3e3b389f95ea6d7f14
SHA3-384 hash: c4720af09bcd768684adf7eb46abd518513811417ae8dcb0201a7a2f124210c4ac0bc140366b045eb7133050da6c6628
SHA1 hash: 9d783978d982c8dcb25970cb5dfaf4fbe2d53bbf
MD5 hash: 0cd7e9aafdb41c9e3523376b434a1271
humanhash: cola-hotel-double-uncle
File name:install.msi
Download: download sample
File size:3'076'096 bytes
First seen:2023-04-14 03:35:34 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 49152:YpdS/ejEnt2W46L2Xan6NpxJ7YI7mcljoF3wREFgbuoBJqqUb:YpJEntr4YnwJEQNjoGuuJP
TLSH T1B6E545913B44C127CA5709364E67D3992369FCE1AE31B48777A1B71E8B79ED3AC21302
TrID 98.2% (.MSI) Microsoft Windows Installer (454500/1/170)
1.7% (.) Generic OLE2 / Multistream Compound (8000/1)
Reporter malware_traffic
Tags:msi

Intelligence


File Origin
# of uploads :
1
# of downloads :
85
Origin country :
US US
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
expand.exe fingerprint packed shell32.dll
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj
Score:
80 / 100
Signature
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Snort IDS alert for network traffic
Uses known network protocols on non-standard ports
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 846539 Sample: install.msi Startdate: 14/04/2023 Architecture: WINDOWS Score: 80 43 wgcuwcgociewewoo.xyz 2->43 47 Snort IDS alert for network traffic 2->47 49 Multi AV Scanner detection for domain / URL 2->49 51 Multi AV Scanner detection for dropped file 2->51 53 3 other signatures 2->53 9 msiexec.exe 3 10 2->9         started        12 msiexec.exe 5 2->12         started        signatures3 process4 file5 35 C:\Windows\Installer\MSI637F.tmp, PE32 9->35 dropped 14 msiexec.exe 5 9->14         started        process6 process7 16 install.exe 1 14->16         started        21 expand.exe 4 14->21         started        23 icacls.exe 1 14->23         started        dnsIp8 37 wgcuwcgociewewoo.xyz 16->37 39 wgcuwcgociewewoo.xyz 185.172.129.192, 1775, 49685, 49686 FIRST-SERVER-US-ASRU Russian Federation 16->39 41 mmswgeewswyyywqk.xyz 16->41 29 C:\Users\user\AppData\Local\...\hyper-v.exe, PE32 16->29 dropped 45 Performs DNS queries to domains with low reputation 16->45 31 C:\Users\user\AppData\...\install.exe (copy), PE32 21->31 dropped 33 C:\...\12bf3f300f550e4ca8e48415bd95c4e0.tmp, PE32 21->33 dropped 25 conhost.exe 21->25         started        27 conhost.exe 23->27         started        file9 signatures10 process11
Threat name:
Binary.Trojan.Generic
Status:
Suspicious
First seen:
2023-04-13 22:13:15 UTC
File Type:
Binary (Archive)
Extracted files:
40
AV detection:
5 of 36 (13.89%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery spyware stealer
Behaviour
Checks SCSI registry key(s)
Gathers system information
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Program crash
Drops file in Windows directory
Enumerates connected drives
Executes dropped EXE
Loads dropped DLL
Modifies file permissions
Reads user/profile data of web browsers
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments