MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 595ee523a6223553a7269daf41e5b95ab1e666fdf0ab5c3ac0c5bc97efd6adbd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 595ee523a6223553a7269daf41e5b95ab1e666fdf0ab5c3ac0c5bc97efd6adbd
SHA3-384 hash: 18f60fb6397bbbefd8cc5bf63301258989a9397e79eb5471dcc587249670ea0b2bebf192567fbc33627ebc1bf68c06f8
SHA1 hash: 4747cdb1718dfb4b275171463d182346d5d59465
MD5 hash: 8960b284dfbb08e0849ed28bc7659f73
humanhash: cat-white-washington-april
File name:595ee523a6223553a7269daf41e5b95ab1e666fdf0ab5c3ac0c5bc97efd6adbd
Download: download sample
File size:656'384 bytes
First seen:2021-12-23 23:48:54 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9c6818acd16acd49682347eebffba784
ssdeep 12288:6mwF2m5y27mWRHnopUAasmNhC1J68kMW9wHFBLMatpjN:RCJjFoiLVbC1U8k5wlBAu
Threatray 90 similar samples on MalwareBazaar
TLSH T178D46C5BF6B484B7D076D23AC5638A8AE772BC514B30838B5291E73A5F333906D3A315
File icon (PE):PE icon
dhash icon 71b119dcce576333 (3'570 x Heodo, 203 x TrickBot, 19 x Gh0stRAT)
Reporter Anonymous
Tags:BazaLoader BazarLoader exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
237
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
595ee523a6223553a7269daf41e5b95ab1e666fdf0ab5c3ac0c5bc97efd6adbd
Verdict:
No threats detected
Analysis date:
2021-12-23 23:51:29 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
DNS request
Running batch commands
Creating a process with a hidden window
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
CursorPosition
CheckScreenResolution
SystemUptime
CheckCmdLine
EvasionGetTickCount
EvasionQueryPerformanceCounter
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
greyware keylogger packed
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
80 / 100
Signature
Creates an autostart registry key pointing to binary in C:\Windows
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Sigma detected: Suspicious Call by Ordinal
Sigma detected: UNC2452 Process Creation Patterns
Uses cmd line tools excessively to alter registry or file data
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 544715 Sample: rNYM36lL4S Startdate: 24/12/2021 Architecture: WINDOWS Score: 80 92 Sigma detected: UNC2452 Process Creation Patterns 2->92 94 Sigma detected: Suspicious Call by Ordinal 2->94 10 loaddll64.exe 1 2->10         started        12 rundll32.exe 2->12         started        15 rundll32.exe 2->15         started        process3 signatures4 17 rundll32.exe 10->17         started        19 cmd.exe 1 10->19         started        22 rundll32.exe 10->22         started        24 rundll32.exe 10->24         started        108 Writes to foreign memory regions 12->108 110 Modifies the context of a thread in another process (thread injection) 12->110 112 Injects a PE file into a foreign processes 12->112 26 cmd.exe 1 12->26         started        28 cmd.exe 12->28         started        30 chrome.exe 12->30         started        process5 dnsIp6 33 cmd.exe 1 17->33         started        96 Uses ping.exe to sleep 19->96 98 Uses cmd line tools excessively to alter registry or file data 19->98 100 Uses ping.exe to check the status of other devices and networks 19->100 35 rundll32.exe 19->35         started        37 cmd.exe 1 22->37         started        39 conhost.exe 26->39         started        41 reg.exe 26->41         started        43 conhost.exe 28->43         started        45 reg.exe 28->45         started        90 103.208.86.173, 443, 49794 ZAPPIE-HOST-ASZappieHostGB New Zealand 30->90 signatures7 process8 process9 47 rundll32.exe 33->47         started        49 conhost.exe 33->49         started        51 timeout.exe 1 33->51         started        53 rundll32.exe 37->53         started        55 conhost.exe 37->55         started        57 choice.exe 1 37->57         started        process10 59 cmd.exe 1 47->59         started        62 cmd.exe 1 47->62         started        64 cmd.exe 1 53->64         started        66 cmd.exe 1 53->66         started        signatures11 102 Uses ping.exe to sleep 59->102 68 PING.EXE 1 59->68         started        86 2 other processes 59->86 71 conhost.exe 62->71         started        73 reg.exe 1 62->73         started        104 Uses cmd line tools excessively to alter registry or file data 64->104 75 reg.exe 1 1 64->75         started        78 conhost.exe 64->78         started        80 rundll32.exe 66->80         started        82 conhost.exe 66->82         started        84 choice.exe 1 66->84         started        process12 dnsIp13 88 192.0.2.198 unknown Reserved 68->88 106 Creates an autostart registry key pointing to binary in C:\Windows 75->106 signatures14
Result
Malware family:
n/a
Score:
  6/10
Tags:
persistence
Behaviour
Delays execution with timeout.exe
Modifies registry key
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Adds Run key to start application
Unpacked files
SH256 hash:
595ee523a6223553a7269daf41e5b95ab1e666fdf0ab5c3ac0c5bc97efd6adbd
MD5 hash:
8960b284dfbb08e0849ed28bc7659f73
SHA1 hash:
4747cdb1718dfb4b275171463d182346d5d59465
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments