MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5061fc43a819cced5eb1db95e8969ecd9d91d1d3c3260e391575aecbcafa6a27. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 5061fc43a819cced5eb1db95e8969ecd9d91d1d3c3260e391575aecbcafa6a27
SHA3-384 hash: a3a1baf3a2672ba8a912a61baf36f47ec58b61f4636c63222e42dc7f7562a5e3b7e57b9fda6bcf6baae8188d4c6496d4
SHA1 hash: 4bcc102ad4b5425ba8e78bd4c2266d0e7cbfa3b2
MD5 hash: 097061e7c481d9f8c968af50ae414d44
humanhash: california-mirror-tennis-leopard
File name:5061fc43a819cced5eb1db95e8969ecd9d91d1d3c3260e391575aecbcafa6a27
Download: download sample
File size:6'135'752 bytes
First seen:2020-09-01 09:16:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 041e612d7e018d766da531d39aa48f42
ssdeep 98304:onKeg/yM+N/x40uH5pVMn73kO5rpOHF/M1a6paYYRx0IgUps2j2hcrIxrdxCaeo:Ug/8f79rYHFlYYRSIgUp1jacyp+o
Threatray 23 similar samples on MalwareBazaar
TLSH 97562301B782E0F1DAA701317E9ABA1751A9BE75A7210E83BBDC7E8C4E704D0B275716
Reporter JAMESWT_WT
Tags:Ample Digital Limited

Code Signing Certificate

Organisation:thawte Primary Root CA
Issuer:Thawte Premium Server CA
Algorithm:sha1WithRSAEncryption
Valid from:Nov 17 00:00:00 2006 GMT
Valid to:Dec 30 23:59:59 2020 GMT
Serial number: 3365500879AD73E230B9E01D0D7FAC91
Intelligence: 27 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: C99157DF28D28EBD87B8B041AACCF023CF1C9AD0D21FD7116149D7F96484FA51
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
79
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
n/a
Score:
36 / 100
Signature
A
b
c
d
e
f
i
l
M
n
o
r
S
t
u
V
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-07-30 17:21:14 UTC
File Type:
PE (Exe)
Extracted files:
740
AV detection:
14 of 29 (48.28%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  4/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Modifies data under HKEY_USERS
Suspicious use of AdjustPrivilegeToken
Drops file in Windows directory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments