MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 525d3b180847b425e376157caabbf860b421078903228d919d1e5e0fcce5741c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ParallaxRAT


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 525d3b180847b425e376157caabbf860b421078903228d919d1e5e0fcce5741c
SHA3-384 hash: 9fe717cae915a51f69a039884e1929ec227b8ea57b936c968ebfa871e2b061712e145cfe79f05a8e7abc8df5b8b18795
SHA1 hash: a9cdf9ea04391ad06fdf686fba432dc093593f67
MD5 hash: e5dca24997147b550e3b4bcaa9ce804b
humanhash: west-lake-chicken-moon
File name:fix.exe
Download: download sample
Signature ParallaxRAT
File size:2'169'856 bytes
First seen:2021-02-22 11:31:26 UTC
Last seen:2021-02-22 14:18:45 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d56cf2043ca9d6dbcea4a702f58216df (1 x ParallaxRAT)
ssdeep 24576:Y27VAFQVwzhF5qWSmJkb0YH99B0SvrAmanQgSyj9b4mJTVGkn9MUBl856IS4g+Mv:Y6wzrSFmSEmzCNJTVGApvPv
Threatray 104 similar samples on MalwareBazaar
TLSH 9EA56B13A281343BD436273949A797E4EC3BBD102AE65D5F6FF4AE4C0E356412C3A64B
Reporter JAMESWT_WT
Tags:OOO Fudl ParallaxRAT RAT signed

Code Signing Certificate

Organisation:OOO Fudl
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:2021-02-09T00:00:00Z
Valid to:2022-02-09T23:59:59Z
Serial number: d609b6c95428954a999a8a99d4f198af
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: 26cc728b34c4804df53fa73e78ba196f00a5fb771a30f10c1ae1667590f94aa1
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
159
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
fix.exe
Verdict:
Malicious activity
Analysis date:
2021-02-22 11:28:05 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Parallax RAT
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hijacks the control flow in another process
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file has nameless sections
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected Parallax RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.GenCBL
Status:
Malicious
First seen:
2021-02-22 11:32:09 UTC
File Type:
PE (Exe)
Extracted files:
143
AV detection:
12 of 28 (42.86%)
Threat level:
  5/5
Result
Malware family:
parallax
Score:
  10/10
Tags:
family:parallax rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops startup file
Blocklisted process makes network request
ParallaxRat
ParallaxRat payload
Unpacked files
SH256 hash:
525d3b180847b425e376157caabbf860b421078903228d919d1e5e0fcce5741c
MD5 hash:
e5dca24997147b550e3b4bcaa9ce804b
SHA1 hash:
a9cdf9ea04391ad06fdf686fba432dc093593f67
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments