MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 53ff04cafb2fd9539f52ad21374dbbfa4752e7f276c724b7ea508cdede86a0b4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 53ff04cafb2fd9539f52ad21374dbbfa4752e7f276c724b7ea508cdede86a0b4
SHA3-384 hash: e7be8448e3cb74905e1be6c2f68ef59a8ad486d468d60d89e90d49068dc17178a06fa5d258b7478b6126f5306a127be5
SHA1 hash: 5f045694a4e4b18ff41f6284ec72c796b0a9f62e
MD5 hash: 9004692bba20914e95f5c204761aa92a
humanhash: eighteen-lion-carpet-one
File name:KIEFEL Packaging GmbH Purchase Order.rar.rar
Download: download sample
File size:73'418 bytes
First seen:2023-08-18 09:06:25 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 1536:PRF2OoOE31IQz9pP2OFH+aUQrQQ3rUK8LlK3dxozDbVHj:JgOoL3WQl5+aUQB3gKKlM6zvVD
TLSH T1D77312E44EBA36EB663A08E08ABF0167EC55B5CFDCCE2B7D2640361D0977116C660859
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Reporter cocaman
Tags:rar Siemens


Avatar
cocaman
Malicious email (T1566.001)
From: ""Daniel Haslinger" <azhar.nazir@siemens.com>" (likely spoofed)
Received: "from siemens.com (unknown [185.222.58.240]) "
Date: "18 Aug 2023 06:13:24 +0200"
Subject: "RE: KIEFEL Packaging GmbH Purchase Order"
Attachment: "KIEFEL Packaging GmbH Purchase Order.rar.rar"

Intelligence


File Origin
# of uploads :
1
# of downloads :
85
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:KIEFEL Packaging GmbH Purchase Order.rar.exe
File size:192'512 bytes
SHA256 hash: 93cdf41efa17cd5adac34ef959cadbd1edf13275fad4804303a0ee67959fc8ca
MD5 hash: 46c20cfca7c996514a48fed3f419fb86
MIME type:application/x-dosexec
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control lolbin masquerade replace
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2023-08-17 22:02:46 UTC
File Type:
Binary (Archive)
Extracted files:
5
AV detection:
15 of 38 (39.47%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

rar 53ff04cafb2fd9539f52ad21374dbbfa4752e7f276c724b7ea508cdede86a0b4

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments