MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5920894ae997b61f27b53c9f6e598df5f928acb11a5dc09f4fa0627747f1312d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Lu0Bot


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 5920894ae997b61f27b53c9f6e598df5f928acb11a5dc09f4fa0627747f1312d
SHA3-384 hash: 142c85c3980df1933962315c4e74c5fc227780f61c311cb89284ac87ce0b95aae59dc60f38999ff6206ca9e39111c667
SHA1 hash: 13cb7fdd0006f540425f5da3ea937544215ac286
MD5 hash: 8d3700a6bd7f83aad136993a3b9984ae
humanhash: july-low-steak-friend
File name:8d3700a6bd7f83aad136993a3b9984ae.bin
Download: download sample
Signature Lu0Bot
File size:2'191'360 bytes
First seen:2023-02-20 08:31:35 UTC
Last seen:2023-02-20 10:30:17 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 49152:2kh9ck+SaWDhfaTz016bPGUsaZ99zDOYcX+ryk9D0BLS67LG50:VEg1ibuYcX+V0eQO
Threatray 254 similar samples on MalwareBazaar
TLSH T19BA52346D7ED8823C67423B62DE206C71F3E3C509DB0867F2B8556146D73682ABB2772
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe Lu0Bot

Intelligence


File Origin
# of uploads :
2
# of downloads :
241
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
8d3700a6bd7f83aad136993a3b9984ae.bin
Verdict:
Malicious activity
Analysis date:
2023-02-20 08:34:39 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Creating a process from a recently created file
Сreating synchronization primitives
DNS request
Sending a UDP request
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
80%
Tags:
advpack.dll cmd.exe packed rundll32.exe setupapi.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
48 / 100
Signature
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking system information)
Behaviour
Behavior Graph:
behaviorgraph top1 process2 2 Behavior Graph ID: 811841 Sample: 3kuzrhtW03.exe Startdate: 20/02/2023 Architecture: WINDOWS Score: 48 6 3kuzrhtW03.exe 1 8 2->6         started        9 rundll32.exe 2->9         started        file3 19 C:\Users\user\AppData\Local\...\edvpyvul.dat, PE32+ 6->19 dropped 11 cmd.exe 2 6->11         started        process4 file5 21 C:\Users\user\AppData\Local\...\conhost.exe, PE32 11->21 dropped 14 conhost.exe 1 11->14         started        17 conhost.exe 11->17         started        process6 signatures7 23 Found evasive API chain (may stop execution after checking system information) 14->23 25 Found API chain indicative of debugger detection 14->25
Result
Malware family:
n/a
Score:
  7/10
Tags:
persistence
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
Unpacked files
SH256 hash:
9098a3cbce44f84f2e70c2e9539a43e3867e4aa237800af1d9a3c276fe86af72
MD5 hash:
ba839a7e9d6ab6b13623b13a54e1c3b6
SHA1 hash:
72cbab761ff233df09a032a2606bdf828d7cdcdd
SH256 hash:
5920894ae997b61f27b53c9f6e598df5f928acb11a5dc09f4fa0627747f1312d
MD5 hash:
8d3700a6bd7f83aad136993a3b9984ae
SHA1 hash:
13cb7fdd0006f540425f5da3ea937544215ac286
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments