MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 516cf8b5fbb0a99104baf04078d959371a46d32dda7f448eaa1d2fd52339a020. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 12


Intelligence 12 IOCs YARA 7 File information Comments

SHA256 hash: 516cf8b5fbb0a99104baf04078d959371a46d32dda7f448eaa1d2fd52339a020
SHA3-384 hash: 4cd967d1e8cb5f7cee603c4870c09511bef8fcd57a57ae716b695c0a87461a94320b2b5b5265683a122452e53172c53a
SHA1 hash: 3b9518fca08dddb8daae96fb36f8f69b2c76b989
MD5 hash: fd401aa718d0d7142760899e130da3b7
humanhash: alaska-september-sodium-sweet
File name:fd401aa718d0d7142760899e130da3b7.exe
Download: download sample
File size:5'681'152 bytes
First seen:2022-11-03 07:27:09 UTC
Last seen:2022-11-03 09:26:01 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9cbefe68f395e67356e2a5d8d1b285c0 (58 x LummaStealer, 49 x AuroraStealer, 37 x Vidar)
ssdeep 98304:K53rmpCkIESo3sH9NdZO6D9/5mtqov5ceEO:KJrmC4So3sH9NdZO6D9/5bq5KO
Threatray 57 similar samples on MalwareBazaar
TLSH T1F8463B07F85195A8C0AAD230CA65D293BA307C945F3023D33B51FBBA2B76BD46E79354
gimphash 373753505f5d3a16bea87a97633669ce471766c9efad2cd1231dd7bbf873e52a
TrID 48.7% (.EXE) Win64 Executable (generic) (10523/12/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
167
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
fd401aa718d0d7142760899e130da3b7.exe
Verdict:
No threats detected
Analysis date:
2022-11-03 07:34:05 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Running batch commands
Creating a process with a hidden window
Launching a process
Searching for the window
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
MeasuringTime
EvasionQueryPerformanceCounter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-vm golang greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
64 / 100
Signature
Found Tor onion address
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Uses schtasks.exe or at.exe to add and modify task schedules
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 736762 Sample: UC4teiZeCN.exe Startdate: 03/11/2022 Architecture: WINDOWS Score: 64 71 Multi AV Scanner detection for submitted file 2->71 73 Machine Learning detection for sample 2->73 75 Found Tor onion address 2->75 7 UC4teiZeCN.exe 1 6 2->7         started        12 Dameon.exe 2->12         started        14 Dameon.exe 2->14         started        16 Dameon.exe 2->16         started        process3 dnsIp4 57 get.geojs.io 7->57 59 ookla.wwz.ch 212.4.68.246, 49698, 49699, 49700 TELEZUGWWZTelekomAGTELEZUGCH Switzerland 7->59 63 6 other IPs or domains 7->63 55 C:\Users\user\AppData\Roaming\...\Dameon.exe, PE32+ 7->55 dropped 79 May check the online IP address of the machine 7->79 18 powershell.exe 11 7->18         started        21 powershell.exe 7 7->21         started        23 cmd.exe 1 7->23         started        29 4 other processes 7->29 61 172.67.70.233 CLOUDFLARENETUS United States 12->61 65 4 other IPs or domains 12->65 25 cmd.exe 12->25         started        27 cmd.exe 12->27         started        31 5 other processes 12->31 67 4 other IPs or domains 14->67 33 7 other processes 14->33 69 4 other IPs or domains 16->69 35 7 other processes 16->35 file5 signatures6 process7 signatures8 77 Uses schtasks.exe or at.exe to add and modify task schedules 18->77 37 conhost.exe 18->37         started        39 2 other processes 21->39 41 2 other processes 23->41 43 2 other processes 25->43 45 2 other processes 27->45 47 5 other processes 29->47 49 6 other processes 31->49 51 10 other processes 33->51 53 10 other processes 35->53 process9
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2022-11-02 17:26:00 UTC
File Type:
PE+ (Exe)
AV detection:
10 of 26 (38.46%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence
Behaviour
Creates scheduled task(s)
GoLang User-Agent
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Adds Run key to start application
Looks up external IP address via web service
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
516cf8b5fbb0a99104baf04078d959371a46d32dda7f448eaa1d2fd52339a020
MD5 hash:
fd401aa718d0d7142760899e130da3b7
SHA1 hash:
3b9518fca08dddb8daae96fb36f8f69b2c76b989
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:GoBinTest
Rule name:golang
Rule name:Golangmalware
Author:Dhanunjaya
Description:Malware in Golang
Rule name:HiveRansomware
Author:Dhanunjaya
Description:Yara Rule To Detect Hive V4 Ransomware
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:methodology_golang_build_strings
Author:smiller
Description:Looks for PEs with a Golang build ID

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 516cf8b5fbb0a99104baf04078d959371a46d32dda7f448eaa1d2fd52339a020

(this sample)

  
Delivery method
Distributed via web download

Comments