MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5b3a8ff94b27ba20933e4850821591f20b6c1bf2d9141bb3870d81b8a457ed83. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cutwail


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments 1

SHA256 hash: 5b3a8ff94b27ba20933e4850821591f20b6c1bf2d9141bb3870d81b8a457ed83
SHA3-384 hash: 82666b480f76dc1715e2f4a36cb08ae569cd6247bdb194d8ce5aab869a4da861c2e40227170514ddc0e14e5e1705cb45
SHA1 hash: bc0683af7056df18413716265d24d54572731147
MD5 hash: 357d55e0c7821d2c4bbd26e92ee6a71b
humanhash: triple-failed-venus-cup
File name:357d55e0c7821d2c4bbd26e92ee6a71b
Download: download sample
Signature Cutwail
File size:162'816 bytes
First seen:2021-11-02 12:58:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5ab65f2363f526ecd7d1ca8b33f4bca1 (1 x RaccoonStealer, 1 x Smoke Loader, 1 x Cutwail)
ssdeep 3072:PJZSej9g7vNe7XZwyfS5zSKSwBwaXFZMRX:x4yg7vaVS5zF7I9
Threatray 5 similar samples on MalwareBazaar
TLSH T1E8F39C10B2A3C472DFA754308874C7B52A7BB872197444BB37A43B2E1EB0EF05B65396
File icon (PE):PE icon
dhash icon 480c1c4c4f590f14 (27 x Smoke Loader, 12 x Tofsee, 8 x RedLineStealer)
Reporter zbetcheckin
Tags:32 Cutwail exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
157
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
357d55e0c7821d2c4bbd26e92ee6a71b
Verdict:
Malicious activity
Analysis date:
2021-11-02 13:03:26 UTC
Tags:
trojan sinkhole

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% subdirectories
Creating a file
Enabling the 'hidden' option for recently created files
DNS request
Connection attempt
Connection attempt to an infection source
Creating a window
Launching a process
Sending a custom TCP request
Sending an HTTP POST request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
75%
Tags:
cutwail greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Opens the same file many times (likely Sandbox evasion)
Send many emails (e-Mail Spam)
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to download HTTP data from a sinkholed server
Tries to resolve many domain names, but no domain seems valid
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 513724 Sample: iSBX2z1os7 Startdate: 02/11/2021 Architecture: WINDOWS Score: 100 52 www.waldi.pl 2->52 54 www.usadig.com 2->54 56 463 other IPs or domains 2->56 88 Tries to download HTTP data from a sinkholed server 2->88 90 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->90 92 Multi AV Scanner detection for submitted file 2->92 96 5 other signatures 2->96 8 iSBX2z1os7.exe 3 68 2->8         started        13 tibqanobatib.exe 46 2->13         started        15 tibqanobatib.exe 2->15         started        signatures3 94 System process connects to network (likely due to code injection or exploit) 54->94 process4 dnsIp5 58 www.pupi.cz 8->58 60 www.evcpa.com 8->60 66 199 other IPs or domains 8->66 48 C:\Users\user\tibqanobatib.exe, PE32 8->48 dropped 50 C:\Users\...\tibqanobatib.exe:Zone.Identifier, ASCII 8->50 dropped 98 Drops PE files to the user root directory 8->98 100 Writes to foreign memory regions 8->100 102 Allocates memory in foreign processes 8->102 17 svchost.exe 8->17         started        20 svchost.exe 8->20         started        62 www.owsports.ca 13->62 64 www.abart.pl 13->64 68 71 other IPs or domains 13->68 104 Multi AV Scanner detection for dropped file 13->104 106 Machine Learning detection for dropped file 13->106 108 Injects a PE file into a foreign processes 13->108 22 svchost.exe 13->22         started        24 svchost.exe 13->24         started        26 svchost.exe 15->26         started        file6 110 System process connects to network (likely due to code injection or exploit) 64->110 signatures7 process8 signatures9 84 System process connects to network (likely due to code injection or exploit) 17->84 86 Injects a PE file into a foreign processes 17->86 28 svchost.exe 12 17->28         started        32 svchost.exe 3 12 17->32         started        34 svchost.exe 12 17->34         started        40 5 other processes 17->40 42 3 other processes 20->42 36 svchost.exe 22->36         started        44 4 other processes 22->44 38 svchost.exe 24->38         started        46 4 other processes 26->46 process10 dnsIp11 70 xult.org 28->70 72 webband.com 28->72 78 84 other IPs or domains 28->78 112 System process connects to network (likely due to code injection or exploit) 28->112 114 Opens the same file many times (likely Sandbox evasion) 28->114 74 wolffkran.de 32->74 76 webways.com 32->76 80 150 other IPs or domains 32->80 82 119 other IPs or domains 34->82 signatures12
Threat name:
Win32.Trojan.Racealer
Status:
Malicious
First seen:
2021-11-02 09:39:10 UTC
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
UPX packed file
Unpacked files
SH256 hash:
2667c1ba9a3c1f4b69b0adc75c2ce242373823927b3e5c94d5cb670274c28c93
MD5 hash:
8dbe23493c7ca72a67185942a642a211
SHA1 hash:
aab74fa20f0c9b641755cfc45d3c3df62928b78c
SH256 hash:
5b3a8ff94b27ba20933e4850821591f20b6c1bf2d9141bb3870d81b8a457ed83
MD5 hash:
357d55e0c7821d2c4bbd26e92ee6a71b
SHA1 hash:
bc0683af7056df18413716265d24d54572731147
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:win_pushdo_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.pushdo.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Cutwail

Executable exe 5b3a8ff94b27ba20933e4850821591f20b6c1bf2d9141bb3870d81b8a457ed83

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-11-02 12:58:07 UTC

url : hxxp://5.181.132.165/myblog/posts/186.exe