MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5d101b2efae1e9390ac98e014a05d54338ec45cd73ff5dd70842877910f7b758. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments

SHA256 hash: 5d101b2efae1e9390ac98e014a05d54338ec45cd73ff5dd70842877910f7b758
SHA3-384 hash: 9c048913da6a3de6696e0e85598b002bd1c41ef618a9850a1dc4f9116f188c984d81d8bf92c1941a177fb2e5c44d3a83
SHA1 hash: 243f1f7bb95af8d3c44a270772f408c6febb06af
MD5 hash: 644399a0aff07bd4f7dc1eb5aa5c0236
humanhash: princess-muppet-harry-romeo
File name:SecuriteInfo.com.Trojan.Siggen20.39363.32577.16661
Download: download sample
File size:3'407'872 bytes
First seen:2024-02-22 00:28:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 00bb10a457425746b36936c13a25d800
ssdeep 49152:MVmDUcyg2ImpoHJSt6Ia+CZEV2o8vMT3/nwlU5igpWV7JEW8np2Klad4j0Vs:MsgcypOSUI+qmJo+QZladTV
TLSH T189F5017D1174F31EC00EAB345423ADF4A7F1672E0AED945AB1D7AAE3A76A010D41EF06
TrID 44.4% (.EXE) Win64 Executable (generic) (10523/12/4)
21.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.ICL) Windows Icons Library (generic) (2059/9)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
dhash icon f0cc96e8e096ccf0
Reporter SecuriteInfoCom
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
297
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Cleaner 1.exe
Verdict:
No threats detected
Analysis date:
2021-11-12 22:57:21 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
lolbin packed packed shell32 vmprotect
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
rans.evad
Score:
84 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Deletes shadow drive data (may be related to ransomware)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive system registry key value via command line tool
Uses cmd line tools excessively to alter registry or file data
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1396602 Sample: SecuriteInfo.com.Trojan.Sig... Startdate: 22/02/2024 Architecture: WINDOWS Score: 84 95 Antivirus detection for dropped file 2->95 97 Antivirus / Scanner detection for submitted sample 2->97 99 Multi AV Scanner detection for dropped file 2->99 101 2 other signatures 2->101 10 SecuriteInfo.com.Trojan.Siggen20.39363.32577.16661.exe 4 4 2->10         started        process3 file4 79 C:\Windows\IME\mac.exe, PE32+ 10->79 dropped 81 C:\Windows\IME\Cleaner.exe, PE32+ 10->81 dropped 103 Uses cmd line tools excessively to alter registry or file data 10->103 105 Deletes shadow drive data (may be related to ransomware) 10->105 14 cmd.exe 10->14         started        17 cmd.exe 1 10->17         started        19 cmd.exe 10->19         started        21 109 other processes 10->21 signatures5 process6 signatures7 107 Uses cmd line tools excessively to alter registry or file data 14->107 109 Queries sensitive system registry key value via command line tool 14->109 36 2 other processes 14->36 23 conhost.exe 17->23         started        25 reg.exe 19->25         started        27 Conhost.exe 19->27         started        38 2 other processes 19->38 29 chrome.exe 21->29         started        32 conhost.exe 21->32         started        34 reg.exe 21->34         started        40 152 other processes 21->40 process8 dnsIp9 42 Conhost.exe 25->42         started        44 Conhost.exe 25->44         started        46 Conhost.exe 27->46         started        89 192.168.2.10 unknown unknown 29->89 91 192.168.2.5, 443, 49237, 49703 unknown unknown 29->91 93 239.255.255.250 unknown Reserved 29->93 48 chrome.exe 29->48         started        57 3 other processes 32->57 51 Conhost.exe 34->51         started        53 Conhost.exe 34->53         started        55 Conhost.exe 40->55         started        59 36 other processes 40->59 process10 dnsIp11 61 Conhost.exe 42->61         started        83 www.google.com 142.250.65.196, 443, 49713, 49716 GOOGLEUS United States 48->83 85 clients.l.google.com 142.250.80.78, 443, 49706 GOOGLEUS United States 48->85 87 10 other IPs or domains 48->87 63 Conhost.exe 51->63         started        65 Conhost.exe 55->65         started        67 Conhost.exe 57->67         started        69 Conhost.exe 59->69         started        71 Conhost.exe 59->71         started        process12 process13 73 Conhost.exe 61->73         started        75 Conhost.exe 63->75         started        77 Conhost.exe 65->77         started       
Threat name:
Win64.Ransomware.Encoder
Status:
Malicious
First seen:
2021-07-08 20:33:04 UTC
File Type:
PE+ (Exe)
Extracted files:
12
AV detection:
23 of 38 (60.53%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  10/10
Tags:
ransomware spyware stealer
Behaviour
Checks processor information in registry
Enumerates system info in registry
Interacts with shadow copies
Kills process with taskkill
Modifies Internet Explorer settings
Modifies registry class
Modifies registry key
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Enumerates physical storage devices
Drops file in Windows directory
Drops file in System32 directory
Drops desktop.ini file(s)
Enumerates connected drives
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Deletes shadow copies
Deletes NTFS Change Journal
Unpacked files
SH256 hash:
5d101b2efae1e9390ac98e014a05d54338ec45cd73ff5dd70842877910f7b758
MD5 hash:
644399a0aff07bd4f7dc1eb5aa5c0236
SHA1 hash:
243f1f7bb95af8d3c44a270772f408c6febb06af
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments