MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5066020c9801057b9e6e6e5ced5ef8d35854cb58118e4aae55d7d3b532ebcecd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA 1 File information Comments

SHA256 hash: 5066020c9801057b9e6e6e5ced5ef8d35854cb58118e4aae55d7d3b532ebcecd
SHA3-384 hash: 5f3e6715af9bab6b2c8441806ce27373bd58e6296681a1afb523520c05511f7c6c546d55afc1ee9a48627bd80166ac21
SHA1 hash: 7b6fd6ad2a57578b2012108880bf89afd315ea9c
MD5 hash: 3f43374d0862425c4894da8a4ea9c7f2
humanhash: three-harry-two-emma
File name:-
Download: download sample
File size:285'544 bytes
First seen:2020-06-26 07:29:01 UTC
Last seen:2021-07-14 13:04:09 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 05d3dce2be32df01ca249872dd2cc117 (1 x GuLoader, 1 x HijackLoader)
ssdeep 6144:qmvr9RLcN0BvxoLjGRU4UUU3UUUD9rOAexZc2/SM0GuX98YglwRY1evB6pL:qmr9RUsJGjqU4UUU3UUUZa7x+kc98YqV
Threatray 52 similar samples on MalwareBazaar
TLSH 655412318E04CCA7C6828ABCF868D6FE61AC9FD4F95483FF9059FE147435A5109942AF
Reporter JAMESWT_WT

Code Signing Certificate

Organisation:Dummy
Issuer:Dummy
Algorithm:sha256WithRSAEncryption
Valid from:Jan 1 07:00:00 2013 GMT
Valid to:Jan 2 07:00:00 2013 GMT
Serial number: 7E89B9DF006BD1AA4C48D865039634CA
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 20B80284B8F23151B348126D08F69E603D02793404E452A52666EF566DB71D07
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
74
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Reading critical registry keys
Searching for the window
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
spyw
Score:
20 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 process2 2 Behavior Graph ID: 236635 Sample: - Startdate: 08/06/2020 Architecture: WINDOWS Score: 20 7 -.exe 3 2->7         started        file3 19 C:\Users\user\AppData\...\setup-stub.exe, PE32 7->19 dropped 10 setup-stub.exe 3 53 7->10         started        process4 file5 21 C:\Users\user\AppData\Local\...\nsDialogs.dll, PE32 10->21 dropped 23 C:\Users\user\AppData\Local\...\UserInfo.dll, PE32 10->23 dropped 25 C:\Users\user\AppData\Local\Temp\...\UAC.dll, PE32 10->25 dropped 27 3 other files (none is malicious) 10->27 dropped 31 Tries to harvest and steal browser information (history, passwords, etc) 10->31 14 iexplore.exe 3 84 10->14         started        signatures6 process7 process8 16 iexplore.exe 69 14->16         started        dnsIp9 29 mozilla.org 63.245.208.195, 443, 49736, 49737 unknown United States 16->29
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery persistence evasion trojan spyware
Behaviour
Checks processor information in registry
Suspicious use of WriteProcessMemory
Suspicious use of FindShellTrayWindow
Suspicious behavior: EnumeratesProcesses
Modifies registry class
Drops file in Program Files directory
Modifies service
Checks whether UAC is enabled
Modifies system certificate store
Checks for installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments