MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 586607b7d094e4acb3373d6812e62b870c64d17f18b7c5fd929d4418a61b4f30. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



YellowCockatoo


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: 586607b7d094e4acb3373d6812e62b870c64d17f18b7c5fd929d4418a61b4f30
SHA3-384 hash: 3ac9d5fc825b7e06bfb85cf06f083a6be74a4892957138ea209d6a0143cb931d7f80cdf12091167b429f5b81f51c0df9
SHA1 hash: cf4ff0e277b1609eb77345d50cce6726fc4320aa
MD5 hash: dc63cb9fa87e4edf9e38e4a60164df71
humanhash: mango-michigan-fruit-monkey
File name:deimos.dll
Download: download sample
Signature YellowCockatoo
File size:144'897 bytes
First seen:2022-04-03 05:09:37 UTC
Last seen:2022-04-03 05:47:59 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash dae02f32a21e03ce65412f6e56942daa (123 x YellowCockatoo, 60 x CobaltStrike, 44 x JanelaRAT)
ssdeep 3072:vA56JDXovMFEvVtWK/EYXyS085uqNLrruu:o5qcv7tx/EX0oqNL
Threatray 13 similar samples on MalwareBazaar
TLSH T123E37F81738DDB91EF6C9AF4B8560330E33050AFC512B357A8B17AF99E665685B402CF
Reporter RussianPanda95
Tags:dll Jupyter Polazert solarmarker Yellow Cockatoo YellowCockatoo

Intelligence


File Origin
# of uploads :
2
# of downloads :
228
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
obfuscated overlay packed replace.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Jupyter
Detection:
malicious
Classification:
troj
Score:
64 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Call by Ordinal
Yara detected Jupyter backdoor
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 602000 Sample: deimos.dll Startdate: 03/04/2022 Architecture: WINDOWS Score: 64 13 Multi AV Scanner detection for submitted file 2->13 15 Yara detected Jupyter backdoor 2->15 17 Machine Learning detection for sample 2->17 19 Sigma detected: Suspicious Call by Ordinal 2->19 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        process5 11 rundll32.exe 9->11         started       
Threat name:
ByteCode-MSIL.Backdoor.Polazert
Status:
Malicious
First seen:
2022-04-03 05:10:06 UTC
File Type:
PE (.Net Dll)
Extracted files:
1
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
jupyter
Score:
  10/10
Tags:
family:jupyter
Malware Config
C2 Extraction:
http://146.70.53.153
Unpacked files
SH256 hash:
586607b7d094e4acb3373d6812e62b870c64d17f18b7c5fd929d4418a61b4f30
MD5 hash:
dc63cb9fa87e4edf9e38e4a60164df71
SHA1 hash:
cf4ff0e277b1609eb77345d50cce6726fc4320aa
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:extracted_at_0x44b
Author:cb
Description:sample - file extracted_at_0x44b.exe
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

YellowCockatoo

DLL dll 586607b7d094e4acb3373d6812e62b870c64d17f18b7c5fd929d4418a61b4f30

(this sample)

Comments