MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4ff6abcd8168f723111c09b863ead5dc9b7f3980555ead7d2a90784cbbaf348c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 11
| SHA256 hash: | 4ff6abcd8168f723111c09b863ead5dc9b7f3980555ead7d2a90784cbbaf348c |
|---|---|
| SHA3-384 hash: | 00069c3c2ce21d59a4e41f06e4cd5e34a1bf6b15f0bce5db0884224a06e0b1a77d760e9e47f7c655dcbef14ced91752c |
| SHA1 hash: | 947224d73036008dcb6593811e6211c2a2c82f55 |
| MD5 hash: | 26eacb0c38f1dcea74aad8f8b4fc3800 |
| humanhash: | twelve-eighteen-massachusetts-carpet |
| File name: | BOMBER-CMD.bin |
| Download: | download sample |
| File size: | 45'568 bytes |
| First seen: | 2022-07-11 12:15:51 UTC |
| Last seen: | 2022-07-11 12:55:19 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | a50e815adb2cfe3e58d388c791946db8 (2 x njrat, 2 x DCRat, 1 x Lucifer) |
| ssdeep | 768:zpm7BcEKNvBcvL6VeRNL1a6ZO4PTPz+o+CKr3zQ4NuVVWgP4+z8nbcuyD7UBKOi:zpfEKNCj6VoJl9Go5K7s4Nu3qnouy8Bo |
| Threatray | 153 similar samples on MalwareBazaar |
| TLSH | T15723F147E2CCA9ABF56460796C5F2C685E9CC30836C08262FCD1337A5EF1A064B2D71A |
| TrID | 41.1% (.EXE) UPX compressed Win32 Executable (27066/9/6) 25.1% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 10.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | exe |
Intelligence
File Origin
# of uploads :
2
# of downloads :
203
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
BOMBER-CMD.exe
Verdict:
Malicious activity
Analysis date:
2022-07-11 11:04:28 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
Suspicious
Maliciousness:
Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Searching for the window
Result
Malware family:
n/a
Score:
6/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
60 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2022-06-16 22:25:04 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
21 of 41 (51.22%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 143 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
8/10
Tags:
upx
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
UPX packed file
Unpacked files
SH256 hash:
226dac921a7cbb65aa5ba677f30e1c2b2afc5048374efffd76373b3a01604b43
MD5 hash:
52839c4fd7cfa239bedacc8b0f712937
SHA1 hash:
fe06e8a8fd44b976c177d6c0f5f58d190ee97ebf
SH256 hash:
4ff6abcd8168f723111c09b863ead5dc9b7f3980555ead7d2a90784cbbaf348c
MD5 hash:
26eacb0c38f1dcea74aad8f8b4fc3800
SHA1 hash:
947224d73036008dcb6593811e6211c2a2c82f55
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.50
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
exe 4ff6abcd8168f723111c09b863ead5dc9b7f3980555ead7d2a90784cbbaf348c
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.