MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4bca267476a6f4389ff2b2b96b5d050e822295f1b9c6fb53888bfe5528febe60. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LgoogLoader


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments 1

SHA256 hash: 4bca267476a6f4389ff2b2b96b5d050e822295f1b9c6fb53888bfe5528febe60
SHA3-384 hash: aed1d51f8f0c3d25bde307233cebcf79f1615e249de5067caf79c28f63dbfda86660df1bf2ed5d4e79abeafa23fb86e3
SHA1 hash: fe1db82b5b0c9d615df84ec0044a478de8ed6edb
MD5 hash: b775c970be5b61e0873ad4ce25d755ea
humanhash: south-hawaii-beer-nuts
File name:b775c970be5b61e0873ad4ce25d755ea
Download: download sample
Signature LgoogLoader
File size:1'325'472 bytes
First seen:2022-11-14 13:43:27 UTC
Last seen:2022-11-14 15:38:13 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9e097ad6dfe92315f2dada8dd88ba8b9 (2 x lgoogLoader, 1 x ArkeiStealer)
ssdeep 24576:uDFV/ZfngJrtj1Z3lq601EzKHOUcoPjGn2JZ/vaObXn4PH9n8HnHZcVXHpaq8:uDFVRfng/jz3lq601hHOJ2G274lxXHpO
Threatray 102 similar samples on MalwareBazaar
TLSH T1C655D10890F341A4C7F64FFB986ABE614265C4126BB53E8E5F050B6D15BCFEC5878A23
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 10687972f198c0d0 (2 x LgoogLoader)
Reporter zbetcheckin
Tags:32 exe LgoogLoader signed

Code Signing Certificate

Organisation:synthesis.com
Issuer:R3
Algorithm:sha256WithRSAEncryption
Valid from:2022-09-29T18:13:49Z
Valid to:2022-12-28T18:13:48Z
Serial number: 03e4cc02542459b73e5f191e4187d42b149c
Intelligence: 5 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: f43dfef3956335d4ceed412d4fa761a0179337c402599445f3527210aeec7413
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
204
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
b775c970be5b61e0873ad4ce25d755ea
Verdict:
Malicious activity
Analysis date:
2022-11-14 13:46:20 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file in the %temp% directory
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
EvasionGetTickCount
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
lgoogLoader
Detection:
malicious
Classification:
troj.evad
Score:
84 / 100
Signature
Allocates memory in foreign processes
Contain functionality to detect virtual machines
Contains functionality to infect the boot sector
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Yara detected lgoogLoader
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Zusy
Status:
Malicious
First seen:
2022-11-14 13:44:09 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
23 of 38 (60.53%)
Threat level:
  5/5
Result
Malware family:
lgoogloader
Score:
  10/10
Tags:
family:lgoogloader downloader
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Detects LgoogLoader payload
LgoogLoader
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
84121630f708c86a5541870e68b8b5eefe4212383cdb844bd92224901e7101d9
MD5 hash:
2922c956ca89e9b0b33d4ccf7292f0aa
SHA1 hash:
9108fa769fcfd37996c06199665cd8f9e07dad34
SH256 hash:
2cdeb7e978335874386d4ff4429c1e469d961f6606268bb8b3443aa65e415d36
MD5 hash:
3ead2f31b5f958f01bc72f38619c2b56
SHA1 hash:
c0e5073d77edf25b724ca7e1b04da6228b78aeae
SH256 hash:
4bca267476a6f4389ff2b2b96b5d050e822295f1b9c6fb53888bfe5528febe60
MD5 hash:
b775c970be5b61e0873ad4ce25d755ea
SHA1 hash:
fe1db82b5b0c9d615df84ec0044a478de8ed6edb
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LgoogLoader

Executable exe 4bca267476a6f4389ff2b2b96b5d050e822295f1b9c6fb53888bfe5528febe60

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-11-14 13:43:29 UTC

url : hxxp://195.133.40.10/files/XkvtdYPzvkdx.exe