MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 537c7a26ce5e39643b98d9c078a14d5e955f0fccf49073d05b1f8e3294636b41. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 537c7a26ce5e39643b98d9c078a14d5e955f0fccf49073d05b1f8e3294636b41
SHA3-384 hash: 21b3e633f73486c9ef3996281a5f846e149083b190684a1be31ab51dd187461b3a8356826504f0c5e489ab9734b7ae5d
SHA1 hash: bc20c641e352abf193dc54b8eb8554a6d39c7d3b
MD5 hash: 9db6560c8f7658593c8a86f7f1c4af27
humanhash: sad-kentucky-solar-charlie
File name:617_1648110517_8623.exe
Download: download sample
File size:1'369'088 bytes
First seen:2022-03-25 07:05:21 UTC
Last seen:2022-03-25 08:41:17 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 712f4a29c405ecb576101d367b2180fb (14 x Smoke Loader, 2 x AZORult, 1 x Formbook)
ssdeep 24576:uBXu9HGaS1c4WK5FRUO75CBg5/XWoGYNImnqKF8/M/2pe7qq7apCBJT:uw9SdWK5rUO75F/H2R/NWqquOJ
Threatray 6'884 similar samples on MalwareBazaar
TLSH T1755533873FC1522AC2D802F8EA7CF95999139FE209CC5987589D7CADFB3BB294C51064
File icon (PE):PE icon
dhash icon 61f0e8e8f28c88c0 (1 x Worm.Ramnit)
Reporter JAMESWT_WT
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
189
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
nymeria packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
64 / 100
Signature
Binary is likely a compiled AutoIt script file
Found API chain indicative of debugger detection
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.ClipBanker
Status:
Malicious
First seen:
2022-03-22 03:21:00 UTC
File Type:
PE (Exe)
Extracted files:
68
AV detection:
19 of 42 (45.24%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
Script User-Agent
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
UPX packed file
Unpacked files
SH256 hash:
f52dd50ce47ece03e0ac1eba1f3c60efd79c494cdab1571231f2ac0914dda5d3
MD5 hash:
f2fb32c17c64d235cdc011835ffb415a
SHA1 hash:
76a5e9002e4d27b0a32aee49d39ca4bf9f0e8e42
SH256 hash:
537c7a26ce5e39643b98d9c078a14d5e955f0fccf49073d05b1f8e3294636b41
MD5 hash:
9db6560c8f7658593c8a86f7f1c4af27
SHA1 hash:
bc20c641e352abf193dc54b8eb8554a6d39c7d3b
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments