MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5d26835be2cf4f08f2beeff301c06d05035d0a9ec3afacc71dff22813595c0b9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mydoom


Vendor detections: 18


Intelligence 18 IOCs YARA 2 File information Comments

SHA256 hash: 5d26835be2cf4f08f2beeff301c06d05035d0a9ec3afacc71dff22813595c0b9
SHA3-384 hash: 02d6b893c577774b6608e6e4444435411cca0ce83259b55a6e97e644638012081bc1207ec71b7e94f56623d7a704b96a
SHA1 hash: 02408bb6dc1f3605a7d3f9bad687a858ec147896
MD5 hash: b9b3965d1b218c63cd317ac33edcb942
humanhash: sixteen-wolfram-sodium-neptune
File name:SecuriteInfo.com.Trojan.Siggen18.23618.24708.4475
Download: download sample
Signature Mydoom
File size:323'584 bytes
First seen:2024-07-09 18:19:02 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 33e2b97a6668118b8ed6f558d28a4a77 (1 x Mydoom)
ssdeep 6144:xHQFwJYDzVc1aWLn0IU4eFTE3Ijr2Cq6j7+qmOq:Z6wWcYWL0IUzNGqJq
TLSH T15F64DF84BB5F5566D02188F8758A15F4CBFC8C03A8556F6FF78832423AB2509DF829F8
TrID 37.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
20.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
12.7% (.EXE) Win64 Executable (generic) (10523/12/4)
7.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter SecuriteInfoCom
Tags:exe Mydoom

Intelligence


File Origin
# of uploads :
1
# of downloads :
367
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
wannacry
ID:
1
File name:
rjbhide.github.io/malicioustestsite/samples/exe/ransomware_wanacry.exe
Verdict:
Malicious activity
Analysis date:
2024-07-08 17:10:23 UTC
Tags:
ransomware wannacry wannacryptor

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
Encryption Execution Generic Network Other Ransomware Stealth Wcry
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
crypto epmicrosoft_visual_cc farfli filecoder findstr lolbin masquerade microsoft_visual_cc packed ransomware shell32 tdss wanna wannacry wannacrypt wannacryptor wcry
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AESCRYPT Ransomware
Detection:
malicious
Classification:
rans.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Command shell drops VBS files
Contains functionality to detect sleep reduction / modifications
Contains functionalty to change the wallpaper
Creates files in the recycle bin to hide itself
Deletes shadow drive data (may be related to ransomware)
Found stalling execution ending in API Sleep call
Found Tor onion address
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Writes many files with high entropy
Yara detected AESCRYPT Ransomware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1470305 Sample: SecuriteInfo.com.Trojan.Sig... Startdate: 09/07/2024 Architecture: WINDOWS Score: 100 50 www.dropbox.com 2->50 52 dist.torproject.org 2->52 54 www-env.dropbox-dns.com 2->54 62 Malicious sample detected (through community Yara rule) 2->62 64 Antivirus / Scanner detection for submitted sample 2->64 66 Multi AV Scanner detection for dropped file 2->66 68 5 other signatures 2->68 8 SecuriteInfo.com.Trojan.Siggen18.23618.24708.4475.exe 4 1001 2->8         started        12 SecuriteInfo.com.Trojan.Siggen18.23618.24708.4475.exe 2->12         started        signatures3 process4 file5 40 C:\Users\user\Desktop\u.wry, PE32 8->40 dropped 42 C:\Users\user\Desktop\00000000.pky, b.out 8->42 dropped 44 C:\Users\user\Desktop\!WannaDecryptor!.exe, PE32 8->44 dropped 46 192 other malicious files 8->46 dropped 70 Creates files in the recycle bin to hide itself 8->70 72 Contains functionalty to change the wallpaper 8->72 74 Found Tor onion address 8->74 76 3 other signatures 8->76 14 !WannaDecryptor!.exe 8->14         started        18 cmd.exe 2 8->18         started        21 taskkill.exe 8->21         started        23 3 other processes 8->23 signatures6 process7 dnsIp8 56 dist.torproject.org 116.202.120.165, 443, 49734, 49738 HETZNER-ASDE Germany 14->56 58 www-env.dropbox-dns.com 162.125.66.18, 443, 49733, 49737 DROPBOXUS United States 14->58 60 127.0.0.1 unknown unknown 14->60 78 Multi AV Scanner detection for dropped file 14->78 80 Contains functionalty to change the wallpaper 14->80 82 Found Tor onion address 14->82 86 3 other signatures 14->86 38 C:\Users\user\Desktop\c.vbs, ASCII 18->38 dropped 84 Command shell drops VBS files 18->84 25 cscript.exe 3 18->25         started        28 conhost.exe 18->28         started        30 conhost.exe 21->30         started        32 conhost.exe 23->32         started        34 conhost.exe 23->34         started        36 conhost.exe 23->36         started        file9 signatures10 process11 file12 48 C:\Users\user\...\!WannaDecryptor!.exe.lnk, MS 25->48 dropped
Threat name:
Win32.Ransomware.WannaCry
Status:
Malicious
First seen:
2017-04-17 23:51:16 UTC
File Type:
PE (Exe)
Extracted files:
13
AV detection:
35 of 38 (92.11%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
wannacry
Score:
  10/10
Tags:
family:wannacry defense_evasion execution impact persistence ransomware spyware stealer worm
Behaviour
Interacts with shadow copies
Kills process with taskkill
Modifies system certificate store
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Enumerates physical storage devices
Sets desktop wallpaper using registry
Adds Run key to start application
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Deletes shadow copies
Wannacry
Unpacked files
SH256 hash:
271ed5954c891c2fa5d17d9708c1f312ecf741430ff5ba3bb6b70e595c63668f
MD5 hash:
32e811fc4cc0b278bff3d38c762a7307
SHA1 hash:
5948b01e0eaa51d1a89a2f42c86d682b5c880e60
Detections:
win_wannacryptor_auto win_wannacryptor_g0 Win32_Ransomware_WannaCry
SH256 hash:
5d26835be2cf4f08f2beeff301c06d05035d0a9ec3afacc71dff22813595c0b9
MD5 hash:
b9b3965d1b218c63cd317ac33edcb942
SHA1 hash:
02408bb6dc1f3605a7d3f9bad687a858ec147896
Detections:
WannaCry_Ransomware Win32_Ransomware_WannaCry
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:WannaCry_Ransomware
Author:Florian Roth (Nextron Systems) (with the help of binar.ly)
Description:Detects WannaCry Ransomware
Reference:https://goo.gl/HG2j5T
Rule name:Win32_Ransomware_WannaCry
Author:ReversingLabs
Description:Yara rule that detects WannaCry ransomware.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
CHECK_TRUST_INFORequires Elevated Execution (uiAccess:None)high
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetStartupInfoA
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryA
KERNEL32.dll::CreateFileA
KERNEL32.dll::GetFileAttributesA
KERNEL32.dll::FindFirstFileA
WIN_CRYPT_APIUses Windows Crypt APIADVAPI32.dll::CryptAcquireContextA
ADVAPI32.dll::CryptDecrypt
ADVAPI32.dll::CryptImportKey
WIN_USER_APIPerforms GUI ActionsUSER32.dll::FindWindowA
USER32.dll::PeekMessageA
USER32.dll::CreateWindowExA

Comments