MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5b01dd6f1a32970d3d81dd10cf493e9d033d7bbcae7b826d07815c0ca1b97203. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Worm.Ramnit


Vendor detections: 12


Intelligence 12 IOCs YARA 4 File information Comments 1

SHA256 hash: 5b01dd6f1a32970d3d81dd10cf493e9d033d7bbcae7b826d07815c0ca1b97203
SHA3-384 hash: 976d3cddf8761d23b9d993e28bb139811b49ffaf34effeced1d5e80db5764a48d4e5eaffd5d98b57fc8d49b5e56230f0
SHA1 hash: af8923c955957325ee20dabebbf2a0c0c4007eea
MD5 hash: 27ab6a7528871227694644007c30081b
humanhash: harry-glucose-seventeen-salami
File name:27ab6a7528871227694644007c30081b
Download: download sample
Signature Worm.Ramnit
File size:68'096 bytes
First seen:2022-06-06 23:54:31 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d450bcae35dd205865d1ae0b90837f42 (1 x Worm.Ramnit)
ssdeep 1536:CPlCGjrZRlV1eCE6cWzPLo9Zh4hb0qfWT5M4W6GCq2iW7z:WLrV1eCjx8Z2ewWT5rxGCH
TLSH T172635C17265CC472D45204F02177AB138FABAA75549F70ABEB5188643E636C1AC3EFCB
TrID 38.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
20.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
13.0% (.EXE) Win64 Executable (generic) (10523/12/4)
8.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon 44b279d898f07082 (2 x Worm.Ramnit, 1 x Nitol)
Reporter zbetcheckin
Tags:32 exe Worm.Ramnit

Intelligence


File Origin
# of uploads :
1
# of downloads :
430
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
27ab6a7528871227694644007c30081b
Verdict:
Malicious activity
Analysis date:
2022-06-06 23:55:44 UTC
Tags:
trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% directory
Creating a process from a recently created file
Changing an executable file
Creating a window
Creating a file in the Windows directory
Creating a service
Launching a service
Creating a file in the Windows subdirectories
Searching for synchronization primitives
Adding an access-denied ACE
Creating a file
Moving a file to the Windows subdirectory
Сreating synchronization primitives
Creating a process with a hidden window
Modifying an executable file
Running batch commands
Enabling autorun for a service
Query of malicious DNS domain
Moving of the original file
Infecting executable files
Sending an HTTP GET request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
banload coinminer evasive greyware nimnul nitol packed ramnit shell32.dll virus virut
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Detected unpacking (changes PE section rights)
Drops executables to the windows directory (C:\Windows) and starts them
Found stalling execution ending in API Sleep call
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
Moves itself to temp directory
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
Snort IDS alert for network traffic
Uses known network protocols on non-standard ports
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 640249 Sample: u2dCe01DuC Startdate: 07/06/2022 Architecture: WINDOWS Score: 100 123 Snort IDS alert for network traffic 2->123 125 Multi AV Scanner detection for domain / URL 2->125 127 Antivirus detection for URL or domain 2->127 129 10 other signatures 2->129 9 u2dCe01DuC.exe 1 3 2->9         started        13 kikeew.exe 4 2->13         started        16 kikeew.exe 3 2->16         started        18 15 other processes 2->18 process3 dnsIp4 91 C:\Windows\kikeew.exe, PE32 9->91 dropped 103 2 other malicious files 9->103 dropped 143 Moves itself to temp directory 9->143 20 zWo.exe 16 9->20         started        111 82.157.142.132, 49721, 49751, 49754 ECLIPSEGB China 13->111 113 v8.ter.tf 13->113 93 C:\Windows\Temp\zWo.exe, PE32 13->93 dropped 95 C:\Windows\SysWOW64\hra8.dll, PE32 13->95 dropped 105 2 other files (1 malicious) 13->105 dropped 145 Found stalling execution ending in API Sleep call 13->145 147 Drops executables to the windows directory (C:\Windows) and starts them 13->147 25 zWo.exe 1 28 13->25         started        27 hrlF48D.tmp 13->27         started        115 v8.ter.tf 16->115 97 C:\Windows\Temp\hrl2D02.tmp, PE32 16->97 dropped 99 C:\RCX2C07.tmp, PE32 16->99 dropped 29 hrl2D02.tmp 16->29         started        31 zWo.exe 16->31         started        117 127.0.0.1 unknown unknown 18->117 119 192.168.2.1 unknown unknown 18->119 121 7 other IPs or domains 18->121 101 C:\Windows\Temp\hrl77B7.tmp, PE32 18->101 dropped 107 13 other files (7 malicious) 18->107 dropped 149 Changes security center settings (notifications, updates, antivirus, firewall) 18->149 33 hrl77B7.tmp 18->33         started        35 hrl39A5.tmp 18->35         started        37 hrl477F.tmp 18->37         started        39 2 other processes 18->39 file5 signatures6 process7 dnsIp8 109 ddos.dnsnb8.net 63.251.106.25, 49715, 49720, 49727 VOXEL-DOT-NETUS United States 20->109 87 C:\Program Files (x86)\AutoIt3\...\SciTE.exe, PE32 20->87 dropped 89 C:\Program Files (x86)\AutoIt3\...\MyProg.exe, MS-DOS 20->89 dropped 131 Antivirus detection for dropped file 20->131 133 Multi AV Scanner detection for dropped file 20->133 135 Machine Learning detection for dropped file 20->135 41 WerFault.exe 23 9 20->41         started        137 Detected unpacking (changes PE section rights) 25->137 139 Infects executable files (exe, dll, sys, html) 25->139 43 cmd.exe 1 25->43         started        45 cmd.exe 25->45         started        47 zWo.exe 29->47         started        49 cmd.exe 31->49         started        141 Drops executables to the windows directory (C:\Windows) and starts them 33->141 51 zWo.exe 33->51         started        53 zWo.exe 35->53         started        55 zWo.exe 37->55         started        57 2 other processes 39->57 file9 signatures10 process11 process12 59 conhost.exe 43->59         started        61 hrl85FF.tmp 43->61         started        63 conhost.exe 45->63         started        65 cmd.exe 47->65         started        67 conhost.exe 49->67         started        69 cmd.exe 53->69         started        71 cmd.exe 55->71         started        73 cmd.exe 57->73         started        75 cmd.exe 57->75         started        process13 77 conhost.exe 65->77         started        79 conhost.exe 69->79         started        81 conhost.exe 71->81         started        83 conhost.exe 73->83         started        85 conhost.exe 75->85         started       
Threat name:
Win32.Virus.Jadtre
Status:
Malicious
First seen:
2022-05-31 19:27:36 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
26 of 26 (100.00%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  10/10
Tags:
aspackv2 suricata
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Suspicious behavior: RenamesItself
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Enumerates connected drives
Checks computer location settings
Loads dropped DLL
ASPack v2.12-2.42
Executes dropped EXE
suricata: ET MALWARE Win32.Nitol.K Variant CnC
Unpacked files
SH256 hash:
3c373fde7222d1e3c5a13339d37f3b5752374210ae09974b4f17baa261c3b9a5
MD5 hash:
de61de242b5500304af17e4661100ea5
SHA1 hash:
ed6c1fce0696ce100a93f2d3cea83a0475947e4f
SH256 hash:
adac2828248db4449fa2daba55ec24a021dd1a22645183b9c7c23ca06ff41791
MD5 hash:
9fb9b5a3a86a62ae7e5b890a5b697a82
SHA1 hash:
80faa334dffe1c9991d6c3706de00485f11e80e8
Detections:
win_unidentified_045_g0 win_unidentified_045_auto
SH256 hash:
5b01dd6f1a32970d3d81dd10cf493e9d033d7bbcae7b826d07815c0ca1b97203
MD5 hash:
27ab6a7528871227694644007c30081b
SHA1 hash:
af8923c955957325ee20dabebbf2a0c0c4007eea
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CMD_Shutdown
Author:adm1n_usa32
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:win_unidentified_045_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.unidentified_045.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Worm.Ramnit

Executable exe 5b01dd6f1a32970d3d81dd10cf493e9d033d7bbcae7b826d07815c0ca1b97203

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-06-06 23:54:34 UTC

url : hxxp://82.157.142.132/wormr.exe