MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 504ff4e37ac526cdb49cca15b1b769cf152889ba32fe9440e16974505d885130. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 504ff4e37ac526cdb49cca15b1b769cf152889ba32fe9440e16974505d885130
SHA3-384 hash: ca3f16d5360719679821b06a09094c6ac7b5b0c752fa64c5462816e497af45f2a56f2415e7606c8d8c35d7d9de50edd1
SHA1 hash: d51bbbe7727da807b56ee4a2524b936001df0882
MD5 hash: 1f3b0e841b0a21df370d0e2f594cad89
humanhash: helium-grey-black-blue
File name:pip install.‮yp.exe
Download: download sample
File size:11'071'488 bytes
First seen:2021-07-03 00:58:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5877688b4859ffd051f6be3b8e0cd533 (119 x Babadeda, 2 x DCRat, 2 x RedLineStealer)
ssdeep 196608:hakGFiRi0QJyfqa44mTCB5r3crncVShIu7Cs0fJivDASDfqffyw:haBhJmqa26HSauGsqU3Siw
TLSH C7B63343F9EEBED8F46844B22B7A94434D18DE24426D155EA27AB79031393D33E0DE36
Reporter Anonymous
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
94
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
pip install.‮yp.exe
Verdict:
Malicious activity
Analysis date:
2021-07-03 01:00:21 UTC
Tags:
stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
spre.troj.adwa.spyw.expl.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Detected unpacking (overwrites its own PE header)
Drops PE files to the startup folder
Drops script or batch files to the startup folder
Machine Learning detection for dropped file
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sigma detected: Disable of ETW Trace
Sigma detected: Drops script at startup location
Sigma detected: Execute Script with spoofed extension
Sigma detected: WScript or CScript Dropper
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Uses netsh to modify the Windows network and firewall settings
Yara detected BatToExe compiled binary
Yara detected BrowsingHistoryView browser history reader tool
Yara detected Netcat
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 443713 Sample: pip install.yp.exe Startdate: 03/07/2021 Architecture: WINDOWS Score: 100 83 us-east-1.route-1.000webhost.awex.io 2->83 85 hslog.c1.biz 2->85 87 3 other IPs or domains 2->87 107 Antivirus detection for dropped file 2->107 109 Multi AV Scanner detection for dropped file 2->109 111 Multi AV Scanner detection for submitted file 2->111 113 10 other signatures 2->113 10 pip install.yp.exe 24 2->10         started        13 pip install.yp.exe 24 2->13         started        15 cmd.exe 2->15         started        signatures3 process4 file5 67 C:\Users\user\AppData\Local\Temp\...\nc.exe, PE32 10->67 dropped 69 C:\Users\user\...\WebBrowserPassView.exe, PE32 10->69 dropped 71 C:\Users\user\AppData\Local\...\ProduKey.exe, PE32 10->71 dropped 79 14 other files (4 malicious) 10->79 dropped 17 cmd.exe 10 10->17         started        73 C:\Users\user\AppData\Local\Temp\...\nc.exe, PE32 13->73 dropped 75 C:\Users\user\...\WebBrowserPassView.exe, PE32 13->75 dropped 77 C:\Users\user\...\BrowsingHistoryView.exe, PE32 13->77 dropped 81 14 other files (2 malicious) 13->81 dropped 21 cmd.exe 2 13->21         started        23 conhost.exe 15->23         started        process6 file7 59 C:\Users\user\AppData\...\pip install.yp.exe, PE32 17->59 dropped 61 C:\Users\user\AppData\Local\Temp\nc.exe, PE32 17->61 dropped 63 C:\...\pip install.yp.exe:Zone.Identifier, ASCII 17->63 dropped 99 Suspicious powershell command line found 17->99 101 Drops script or batch files to the startup folder 17->101 103 Drops PE files to the startup folder 17->103 105 2 other signatures 17->105 25 WebBrowserPassView.exe 13 17->25         started        28 ProduKey.exe 1 17->28         started        30 BrowsingHistoryView.exe 17->30         started        38 21 other processes 17->38 65 C:\Users\user\AppData\...\2893196592670.bat, ASCII 21->65 dropped 32 cmd.exe 21->32         started        34 cmd.exe 1 21->34         started        36 powershell.exe 21->36         started        41 3 other processes 21->41 signatures8 process9 dnsIp10 115 Antivirus detection for dropped file 25->115 117 Multi AV Scanner detection for dropped file 25->117 119 Machine Learning detection for dropped file 25->119 121 Tries to harvest and steal browser information (history, passwords, etc) 30->121 43 cmd.exe 32->43         started        45 findstr.exe 32->45         started        47 cscript.exe 34->47         started        50 cmd.exe 36->50         started        89 canarytokens.com 52.18.63.80, 49681, 80 AMAZON-02US United States 38->89 123 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 38->123 52 cscript.exe 1 38->52         started        91 192.168.2.1 unknown unknown 41->91 signatures11 process12 dnsIp13 54 cscript.exe 43->54         started        57 conhost.exe 50->57         started        97 www.cloudflare.com 104.16.123.96, 443, 49682, 49683 CLOUDFLARENETUS United States 52->97 process14 dnsIp15 93 us-east-1.route-1.000webhost.awex.io 145.14.145.153, 443, 49688, 49703 AWEXUS Netherlands 54->93 95 hslog.000webhostapp.com 54->95
Threat name:
Win32.Trojan.Ymacco
Status:
Malicious
First seen:
2021-07-03 00:59:10 UTC
AV detection:
25 of 46 (54.35%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
discovery evasion spyware stealer upx
Behaviour
Script User-Agent
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks installed software on the system
Enumerates connected drives
Maps connected drives based on registry
Drops startup file
Reads user/profile data of web browsers
Blocklisted process makes network request
Executes dropped EXE
Modifies Windows Firewall
UPX packed file
NirSoft WebBrowserPassView
Nirsoft
Unpacked files
SH256 hash:
30802618511065552b0beb40b8875c44f5508b1b6788be4fdf6d6480641e9e45
MD5 hash:
beafad4b12b79a83065806507fd743e3
SHA1 hash:
45c12dae971ffd4f54f0e51391535ef50ce34949
SH256 hash:
70583c13e2ef08468653f61761d79a094e2ae50cf5397c71ddc28c038d4a2c36
MD5 hash:
76596228ce1dec75e61be1dd863c23e4
SHA1 hash:
47838f7c19061b5afce26b5d58d2f9653a2d0ba7
SH256 hash:
36cbfe2a6014b0fd2e108aff704452e24f4ec2e90cda1fa8d413e5917ae18a2f
MD5 hash:
5976ed8e149d6936acc273911f35e52d
SHA1 hash:
27d27e7bb428e4a4c978feda1c5fafca57bd5877
SH256 hash:
f0bb5b85289302f04949110b7258bbf497f719fc1f821450e8e4ac89e85c6bf7
MD5 hash:
6d6cc9e8eb5e62bc1b196ac62d28f283
SHA1 hash:
9cba72e5e4c33bb900eddda4c88ce930bf210177
SH256 hash:
54c4396a62204f3230056568dccd62e67d78f58659eeba4701bca8370bbf3d69
MD5 hash:
679847bae3875f772c1f68f9922ad08c
SHA1 hash:
315fd9cd9497160787fec07b2b1ca7097ff8fab7
SH256 hash:
eb44993b08d97a3b91e3291687d0f42e099f867192b4f7312936085e6b4c3b79
MD5 hash:
247fbaca4c717ed6dc6f8693914fc132
SHA1 hash:
6edcc450a25802b7eabd3f63227c85a453bfd40f
SH256 hash:
18f89f44d6a085e101922f57ef65c84125553a83919071acc58ea2f6d9f37242
MD5 hash:
c6028012f523e6e796472859687afc78
SHA1 hash:
dec15bc8218bcb57dd3096b112e0c48a2d07bb17
SH256 hash:
302bcc62090a9b09288a91ad1e5b5bcc0d60a735c49b4d13ff45e984783243d8
MD5 hash:
e1ad910bc66b9fe38619357e34364296
SHA1 hash:
f3a85d5fe98ca120e3e403723eb3ff3d38499c8e
SH256 hash:
504ff4e37ac526cdb49cca15b1b769cf152889ba32fe9440e16974505d885130
MD5 hash:
1f3b0e841b0a21df370d0e2f594cad89
SHA1 hash:
d51bbbe7727da807b56ee4a2524b936001df0882
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments