MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4ee34cc00d2276e1398af50014c25ac15f1570ff1613bdffd65b63440ab9dd09. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 5 File information Comments

SHA256 hash: 4ee34cc00d2276e1398af50014c25ac15f1570ff1613bdffd65b63440ab9dd09
SHA3-384 hash: 01c5a957d23173bcd101319eb520b6ec6bfdb15070de2fea339e463ac505cbbc1254b8cda6e11d01e36ad47faa170e70
SHA1 hash: 1aae19e3183c88be0ca6922128efdad9c832a55b
MD5 hash: 1cbb57f5b9eb4afbac449d40a1aa1727
humanhash: network-asparagus-mango-sodium
File name:1cbb57f5b9eb4afbac449d40a1aa1727.exe
Download: download sample
File size:670'461 bytes
First seen:2023-07-25 18:27:52 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d5e0355f8764c235b38759b860077ceb (1 x Adware.QQpass, 1 x CoinMiner)
ssdeep 12288:0WygipjUvypL/CQi8ozInJksJ/ZOCqJ3pHWs068giLZzys4C/VO0/9a:kNbqQ+zIaEEnHW1VLZG3CcE9a
Threatray 1 similar samples on MalwareBazaar
TLSH T118E4232585C7A70BC9FF9231114CEC768462D2973662598FC1A10FC2F9EC88F7A69BD1
TrID 27.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
20.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
18.6% (.EXE) Win32 Executable (generic) (4505/5/1)
8.5% (.ICL) Windows Icons Library (generic) (2059/9)
8.3% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon a661d572b3b0f0f2 (1 x Adware.QQpass, 1 x CoinMiner)
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
255
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
1cbb57f5b9eb4afbac449d40a1aa1727.exe
Verdict:
No threats detected
Analysis date:
2023-07-25 18:40:00 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a window
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
72 / 100
Signature
Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2023-07-24 19:11:20 UTC
File Type:
PE (Exe)
Extracted files:
7
AV detection:
23 of 38 (60.53%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
aspackv2
Unpacked files
SH256 hash:
2514ea12b651b2321bd8edf5f11f60ba1fcacd0648f879c60eb40a28a5aeda6d
MD5 hash:
99703040241df0b1a85a0955eed245f4
SHA1 hash:
288c85453c8cd300f14257633182ed6a91eff96c
SH256 hash:
4ee34cc00d2276e1398af50014c25ac15f1570ff1613bdffd65b63440ab9dd09
MD5 hash:
1cbb57f5b9eb4afbac449d40a1aa1727
SHA1 hash:
1aae19e3183c88be0ca6922128efdad9c832a55b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CMD_Ping_Localhost
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:SUSP_XORed_URL_in_EXE
Author:Florian Roth (Nextron Systems)
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834
Rule name:SUSP_XORed_URL_in_EXE_RID2E46
Author:Florian Roth
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 4ee34cc00d2276e1398af50014c25ac15f1570ff1613bdffd65b63440ab9dd09

(this sample)

  
Delivery method
Distributed via web download

Comments