MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4fc12de856dbb5dc58df001bd44e75ad42e106b49ff8eee361cd000744258eb3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cutwail


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 4fc12de856dbb5dc58df001bd44e75ad42e106b49ff8eee361cd000744258eb3
SHA3-384 hash: 249e05b0cf89535715c048be2fbd315e76e1e1dbd39d00f1ff2f37b40ce9a617fbb59a27a5593ed55347bcd84524bbfc
SHA1 hash: 07dac29c1266ab6e49d89ae40eeece41d07875dd
MD5 hash: c92a7da9372f6c5f1f1464aaaa4ce6bc
humanhash: pip-thirteen-lithium-winter
File name:c92a7da9372f6c5f1f1464aaaa4ce6bc.exe
Download: download sample
Signature Cutwail
File size:532'480 bytes
First seen:2022-12-06 14:11:50 UTC
Last seen:2022-12-06 15:38:45 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d381f7bcb1b95d4ba0d8ce8e1dbcd187 (1 x Cutwail)
ssdeep 6144:OfVqINU1IsUXvPRzQMG+6mbt6HKmpjERYkGAvgM7l5vxsQUYrs:OdxOIs4Z1t6NpQSA355vixY
TLSH T18EB4E175E3165D8BDC18267E233CEF79DA4A2916731920E335D81D922AE78F31BB10B1
TrID 43.3% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
27.6% (.EXE) Win64 Executable (generic) (10523/12/4)
13.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.3% (.EXE) OS/2 Executable (generic) (2029/13)
5.2% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter abuse_ch
Tags:Cutwail exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
189
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
c92a7da9372f6c5f1f1464aaaa4ce6bc.exe
Verdict:
Malicious activity
Analysis date:
2022-12-06 14:12:25 UTC
Tags:
trojan sinkhole

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Send many emails (e-Mail Spam)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to resolve many domain names, but no domain seems valid
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 761923 Sample: nwk9iV8lpS.exe Startdate: 06/12/2022 Architecture: WINDOWS Score: 100 49 websy.com 2->49 51 piacton.com 2->51 53 374 other IPs or domains 2->53 87 Snort IDS alert for network traffic 2->87 89 Antivirus detection for URL or domain 2->89 91 Multi AV Scanner detection for submitted file 2->91 97 2 other signatures 2->97 8 nwk9iV8lpS.exe 3 68 2->8         started        13 pigalicapi.exe 48 2->13         started        15 pigalicapi.exe 48 2->15         started        signatures3 93 System process connects to network (likely due to code injection or exploit) 51->93 95 Tries to resolve many domain names, but no domain seems valid 51->95 process4 dnsIp5 63 179 other IPs or domains 8->63 37 C:\Users\user\pigalicapi.exe, PE32 8->37 dropped 39 C:\Users\...\pigalicapi.exe:Zone.Identifier, ASCII 8->39 dropped 99 Drops PE files to the user root directory 8->99 101 Writes to foreign memory regions 8->101 103 Injects a PE file into a foreign processes 8->103 17 svchost.exe 8->17         started        55 www.pb-games.com 13->55 57 websy.com 13->57 65 150 other IPs or domains 13->65 105 Multi AV Scanner detection for dropped file 13->105 107 Machine Learning detection for dropped file 13->107 109 Allocates memory in foreign processes 13->109 21 svchost.exe 13->21         started        59 www.railbook.net 15->59 61 www.fe-bauer.de 15->61 67 140 other IPs or domains 15->67 23 svchost.exe 15->23         started        file6 111 Tries to resolve many domain names, but no domain seems valid 57->111 113 System process connects to network (likely due to code injection or exploit) 61->113 signatures7 process8 dnsIp9 41 185.70.42.128 PROTONCH Switzerland 17->41 43 smtp.mail.global.gm0.yahoodns.net 17->43 47 7 other IPs or domains 17->47 83 System process connects to network (likely due to code injection or exploit) 17->83 85 Injects a PE file into a foreign processes 17->85 25 svchost.exe 12 17->25         started        29 svchost.exe 2 12 17->29         started        31 svchost.exe 12 17->31         started        33 svchost.exe 12 17->33         started        45 mail.airmail.net 66.226.70.66 INFB2-ASUS United States 23->45 35 svchost.exe 23->35         started        signatures10 process11 dnsIp12 69 tcpoa.com 25->69 71 semuk.com 25->71 75 143 other IPs or domains 25->75 115 System process connects to network (likely due to code injection or exploit) 25->115 77 112 other IPs or domains 29->77 73 vdoherty.com 31->73 79 71 other IPs or domains 31->79 81 51 other IPs or domains 33->81 signatures13
Threat name:
Win32.Trojan.Cutwail
Status:
Malicious
First seen:
2022-12-06 11:57:01 UTC
File Type:
PE (Exe)
AV detection:
15 of 26 (57.69%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
UPX packed file
Unpacked files
SH256 hash:
f812cff25ac78391ad0621231aa8556d459a3cea3205a04b097744f1e0116a60
MD5 hash:
ab0fa68fdf4a67b3a404250f073e15ba
SHA1 hash:
7eb499acfbe7a3d4d536ab2de8e95be4d7234bbf
SH256 hash:
36bb8291b32b98a42f3e0f58cb62ad0f73cfee2b670e8e8723711fcd9adc24df
MD5 hash:
b8c1669a0d81441f4da6782a77b146ed
SHA1 hash:
df635ab2d91b8f5de372ffa3c7c3a2a6dbd6ee56
Detections:
win_pushdo_auto
SH256 hash:
4fc12de856dbb5dc58df001bd44e75ad42e106b49ff8eee361cd000744258eb3
MD5 hash:
c92a7da9372f6c5f1f1464aaaa4ce6bc
SHA1 hash:
07dac29c1266ab6e49d89ae40eeece41d07875dd
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Cutwail

Executable exe 4fc12de856dbb5dc58df001bd44e75ad42e106b49ff8eee361cd000744258eb3

(this sample)

  
Delivery method
Distributed via web download

Comments