MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 54a477f68ee0f09eb5b30d5ec19be8e74ef886d74c63de4ee063a2f0a23342e7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments

SHA256 hash: 54a477f68ee0f09eb5b30d5ec19be8e74ef886d74c63de4ee063a2f0a23342e7
SHA3-384 hash: 7aee7a834de19c2ce8d3d720141ba94fbb37b464b421bb2431e5f53e1e920f53fc94464aa61faef39c73ab08e9787d98
SHA1 hash: 22485d6bc74fb089955a50e0671e2e6a7811a2e9
MD5 hash: 79f1a80893d97765ed399b3b006689e1
humanhash: kilo-ack-hamper-uncle
File name:79f1a80893d97765ed399b3b006689e1.exe
Download: download sample
File size:1'288'529 bytes
First seen:2023-09-07 16:24:04 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 80417b621299e3e1de617305557a3c68 (48 x GCleaner, 44 x Backdoor.TeamViewer, 31 x Socks5Systemz)
ssdeep 24576:oI39dX7jFzSnwHOne2dsI2ky6cza6cO97b3f0xiDIud7HehgebVKoyInpD:o6dX7jFzeiOnbuky60P33oux8VbvfnpD
Threatray 1'035 similar samples on MalwareBazaar
TLSH T1E9553341D724D5B1C2E8DEF1ADDD46494A32FA2F282C1C4D768F1E1A2FBF0512469B8E
TrID 50.8% (.EXE) Win32 Executable PowerBASIC/Win 9.x (148303/79/28)
37.6% (.EXE) Inno Setup installer (109740/4/30)
4.8% (.EXE) Win32 Executable Delphi generic (14182/79/4)
2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
267
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
79f1a80893d97765ed399b3b006689e1.exe
Verdict:
Malicious activity
Analysis date:
2023-09-07 16:27:26 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Launching the process to interact with network services
Modifying a system file
Creating a file
Creating a service
Launching a process
Enabling autorun for a service
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control greyware installer lolbin overlay packed packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Contains functionality to infect the boot sector
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found API chain indicative of debugger detection
Found stalling execution ending in API Sleep call
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1305551 Sample: NGMO5jReI4.exe Startdate: 07/09/2023 Architecture: WINDOWS Score: 100 46 Snort IDS alert for network traffic 2->46 48 Antivirus detection for URL or domain 2->48 50 Multi AV Scanner detection for dropped file 2->50 52 7 other signatures 2->52 8 NGMO5jReI4.exe 2 2->8         started        11 svchost.exe 1 2->11         started        13 svchost.exe 1 2->13         started        process3 file4 32 C:\Users\user\AppData\Local\...\is-CRNME.tmp, PE32 8->32 dropped 15 is-CRNME.tmp 10 21 8->15         started        process5 file6 34 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 15->34 dropped 36 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 15->36 dropped 38 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 15->38 dropped 40 7 other files (6 malicious) 15->40 dropped 18 previewer.exe 1 17 15->18         started        21 previewer.exe 1 3 15->21         started        24 net.exe 1 15->24         started        process7 dnsIp8 42 diqrveo.info 185.141.63.172, 49732, 49734, 49736 BELCLOUDBG Bulgaria 18->42 44 datasheet.fun 172.67.166.109, 49730, 80 CLOUDFLARENETUS United States 18->44 30 C:\ProgramData\...\ContentDWSvc.exe, PE32 21->30 dropped 26 conhost.exe 24->26         started        28 net1.exe 1 24->28         started        file9 process10
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2023-09-06 19:59:57 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
13 of 24 (54.17%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Runs net.exe
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Unexpected DNS network traffic destination
Unpacked files
SH256 hash:
0ef25ab3bd91b9d78797a1bbf7761af9219418647d72b77630310e4ecab456e9
MD5 hash:
35b812f63d625d098e55a5dec1c1ff5f
SHA1 hash:
c2d38a791e773e806adbf525c95a98413e97950d
SH256 hash:
5672bc8df4aa6aa6b81cb6583bab0e8bf3c72990d8fb772bf0980ce69dd01472
MD5 hash:
d260bf4ce54269ec0b7f83ff68cac656
SHA1 hash:
da102836d0530bcb3e9bba611e9bed556d8c27ae
SH256 hash:
6bfdd1d2099b0a7c7ef3ca1145d0b5e8c4628f8177cf925f7a8f83a960434948
MD5 hash:
be5eae91c552c66ee2f1a14c1fa47def
SHA1 hash:
d4fd9acdc68d941d53c47a1cc8d0195016de1ded
SH256 hash:
88face005bd77c6cac8d4d4edf93cb86c6496c46d686b7cfda28c81e8216259c
MD5 hash:
34243f7d7731ddfa26c58e1731069eed
SHA1 hash:
ca85b529a1ca11716060b7dd066d8d2a54195355
SH256 hash:
54a477f68ee0f09eb5b30d5ec19be8e74ef886d74c63de4ee063a2f0a23342e7
MD5 hash:
79f1a80893d97765ed399b3b006689e1
SHA1 hash:
22485d6bc74fb089955a50e0671e2e6a7811a2e9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 54a477f68ee0f09eb5b30d5ec19be8e74ef886d74c63de4ee063a2f0a23342e7

(this sample)

  
Delivery method
Distributed via web download

Comments