MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 557617d88ada1bd861262710042a6e63df42e5a8d4874470aabe143327abdcab. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 13
| SHA256 hash: | 557617d88ada1bd861262710042a6e63df42e5a8d4874470aabe143327abdcab |
|---|---|
| SHA3-384 hash: | 86cf964d48c44cd5e78af69053136c2c10bb993c2b8118ddba6020a6f6a7698769b59e015c9eb029f2ac36ec5348dc1c |
| SHA1 hash: | c936b6a86b76160520b2ca0bf33edd0f766b2476 |
| MD5 hash: | ec7f50965cb1452b6401a51f7d763655 |
| humanhash: | magazine-georgia-quiet-six |
| File name: | ec7f50965cb1452b6401a51f7d763655.exe |
| Download: | download sample |
| File size: | 1'158'144 bytes |
| First seen: | 2023-03-03 15:07:33 UTC |
| Last seen: | 2023-03-03 16:36:00 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 0557b2303713417ae37d446b478fb9b9 (1 x RedLineStealer, 1 x AuroraStealer) |
| ssdeep | 6144:TAr+rCRf455FrkSaTSfzd8KakA8AOTYbRuL62wKGVbfE4C:ARfSFAScIGtuLbwKGGd |
| TLSH | T1DD35BF11B4D0C472E4B215320AE8EB755E7EB9200B6659EF6BE40F6E4F343C1DB31A66 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | exe |
Intelligence
File Origin
# of uploads :
2
# of downloads :
194
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ec7f50965cb1452b6401a51f7d763655.exe
Verdict:
Malicious activity
Analysis date:
2023-03-03 15:09:38 UTC
Tags:
ransomware
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Babuk
Result
Verdict:
Malware
Maliciousness:
Behaviour
Launching a process
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Creating a file
Changing a file
Launching a service
Searching for synchronization primitives
Forced shutdown of a system process
Creating a file in the mass storage device
Deleting volume shadow copies
Unauthorized injection to a system process
Forced shutdown of a browser
Encrypting user's files
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
greyware packed
Verdict:
Malicious
Labled as:
Win/malicious_confidence_60%
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Babuk ransomware
Verdict:
Malicious
Result
Threat name:
Babuk
Detection:
malicious
Classification:
rans.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Deletes shadow drive data (may be related to ransomware)
Found ransom note / readme
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May disable shadow drive data (uses vssadmin)
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Yara detected Babuk Ransomware
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Zusy
Status:
Malicious
First seen:
2023-03-02 21:55:17 UTC
File Type:
PE (Exe)
AV detection:
18 of 25 (72.00%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
9/10
Tags:
ransomware
Behaviour
Interacts with shadow copies
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Suspicious use of SetThreadContext
Enumerates connected drives
Modifies extensions of user files
Deletes shadow copies
Unpacked files
SH256 hash:
db60976e7fb1f9eb6e5c93f5d7c34372bba2b15be1b242d1abff20755679b93d
MD5 hash:
a57f94171e430598caca1afd7f660750
SHA1 hash:
2d134bde22d8589235c10c4467220cb08aab79d8
Detections:
win_astralocker_auto
Parent samples :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 hash:
557617d88ada1bd861262710042a6e63df42e5a8d4874470aabe143327abdcab
MD5 hash:
ec7f50965cb1452b6401a51f7d763655
SHA1 hash:
c936b6a86b76160520b2ca0bf33edd0f766b2476
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.