MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5d47d5ad88c5d99cac3a860e682bb9542046e05ee33b3a4fd896db5464e7f0a6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 2 File information Comments

SHA256 hash: 5d47d5ad88c5d99cac3a860e682bb9542046e05ee33b3a4fd896db5464e7f0a6
SHA3-384 hash: 3f51e1718d8f050165f1bcfaefdf7f3a2b0e0dbe0d2be60dad833e40c27ff7e4b6b6be669cf918e28aff8806cba3da58
SHA1 hash: 709a67ee148978a05bb3c3b530d68004c1eb5196
MD5 hash: 7fdb00c80f0250575a05601c08627d50
humanhash: jig-pizza-lake-berlin
File name:virussign.com_7fdb00c80f0250575a05601c08627d50
Download: download sample
File size:3'987'229 bytes
First seen:2022-07-15 16:51:52 UTC
Last seen:2024-07-24 14:52:32 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 8c16c795b57934183422be5f6df7d891 (36 x Mofksys, 18 x CryptOne, 6 x AveMariaRAT)
ssdeep 98304:xJ9toRH4BY81fY8i2k5x2Vy5nkvusNFl0K9xdi:xfee2Gtu/GusNf0axQ
Threatray 5'336 similar samples on MalwareBazaar
TLSH T1C9063323AB94043FD81242F075B5C639B9407E710AB99D472BAAFA15A6F3B4337B411F
TrID 52.9% (.EXE) Win32 Executable (generic) (4505/5/1)
23.5% (.EXE) Generic Win/DOS Executable (2002/3)
23.5% (.EXE) DOS Executable Generic (2000/1)
dhash icon 699669d8d86996c9 (3 x Mofksys)
Reporter KdssSupport
Tags:exe


Avatar
KdssSupport
Uploaded with API

Intelligence


File Origin
# of uploads :
2
# of downloads :
133
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
Creating a file in the Windows subdirectories
Creating a file
Creating a process from a recently created file
Creating a file in the %AppData% subdirectories
Creating a process with a hidden window
Changing a file
Enabling the 'hidden' option for recently created files
DNS request
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Setting a single autorun event
Enabling a "Do not show hidden files" option
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
overlay packed packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CryptOne, Mofksys
Detection:
malicious
Classification:
spre.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected CryptOne packer
Detected unpacking (changes PE section rights)
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
System process connects to network (likely due to code injection or exploit)
Yara detected Mofksys
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 666578 Sample: sJ9Q8UWMAX.com_7fdb00c80f02... Startdate: 16/07/2022 Architecture: WINDOWS Score: 100 72 Antivirus / Scanner detection for submitted sample 2->72 74 Multi AV Scanner detection for submitted file 2->74 76 Detected unpacking (changes PE section rights) 2->76 78 8 other signatures 2->78 10 sJ9Q8UWMAX.exe 1 3 2->10         started        14 svchost.exe 9 1 2->14         started        17 svchost.exe 2->17         started        19 3 other processes 2->19 process3 dnsIp4 50 C:\Users\user\Desktop\sj9q8uwmax.exe, PE32 10->50 dropped 52 C:\Windows\Resources\Themes\icsys.icn.exe, MS-DOS 10->52 dropped 106 Drops executables to the windows directory (C:\Windows) and starts them 10->106 21 icsys.icn.exe 2 10->21         started        26 sj9q8uwmax.exe 18 10->26         started        70 127.0.0.1 unknown unknown 14->70 file5 signatures6 process7 dnsIp8 56 192.168.2.1 unknown unknown 21->56 48 C:\Windows\Resources\Themes\explorer.exe, MS-DOS 21->48 dropped 88 Antivirus detection for dropped file 21->88 90 Machine Learning detection for dropped file 21->90 92 Drops executables to the windows directory (C:\Windows) and starts them 21->92 94 Drops PE files with benign system names 21->94 28 explorer.exe 14 21->28         started        96 Hides that the sample has been downloaded from the Internet (zone.identifier) 26->96 33 sj9q8uwmax.exe 1 1 26->33         started        35 sj9q8uwmax.exe 6 26->35         started        file9 signatures10 process11 dnsIp12 58 codecmd03.googlecode.com 28->58 60 codecmd02.googlecode.com 28->60 66 2 other IPs or domains 28->66 54 C:\Windows\Resources\spoolsv.exe, MS-DOS 28->54 dropped 108 Antivirus detection for dropped file 28->108 110 System process connects to network (likely due to code injection or exploit) 28->110 112 Machine Learning detection for dropped file 28->112 114 Drops PE files with benign system names 28->114 37 spoolsv.exe 2 28->37         started        62 49.12.130.236, 443, 49769, 49807 HETZNER-ASDE Germany 33->62 64 49.12.130.237, 443, 49889 HETZNER-ASDE Germany 33->64 68 2 other IPs or domains 33->68 file13 signatures14 process15 file16 46 C:\Windows\Resources\svchost.exe, MS-DOS 37->46 dropped 80 Antivirus detection for dropped file 37->80 82 Machine Learning detection for dropped file 37->82 84 Drops executables to the windows directory (C:\Windows) and starts them 37->84 86 Drops PE files with benign system names 37->86 41 svchost.exe 2 2 37->41         started        signatures17 process18 signatures19 98 Antivirus detection for dropped file 41->98 100 Detected CryptOne packer 41->100 102 Machine Learning detection for dropped file 41->102 104 Drops executables to the windows directory (C:\Windows) and starts them 41->104 44 spoolsv.exe 1 41->44         started        process20
Threat name:
Win32.Trojan.Golsys
Status:
Malicious
First seen:
2022-07-13 15:36:30 UTC
File Type:
PE (Exe)
Extracted files:
18
AV detection:
26 of 26 (100.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion persistence
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Drops file in System32 directory
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Modifies visiblity of hidden/system files in Explorer
Unpacked files
SH256 hash:
ff39dfdbc3a13ccbc8686af405a26ad51b14885add4a4ebd83fcf8bd99c48add
MD5 hash:
81a9f3fb1cd093d8bd8e1acc362cf992
SHA1 hash:
a30a11263522de06360c50118f0b477a30216ed5
SH256 hash:
75ccfdf79e14495efe566513b0a937f1fe9f3e27f7174b27f70d110c811c562c
MD5 hash:
a757cb9baa683c2526045a30891fd96e
SHA1 hash:
849a62c4c401f7c2168424c7bc5f92f7a2d9f15b
SH256 hash:
22fe7d4c5606417510ed1e7b372ea39b6ad0091e6b70670d9054e889ef94c863
MD5 hash:
18400eec7d8723718e95023cd14aafc1
SHA1 hash:
7af652f8218a9ea7db8daaedb7d76fe0ded6f428
SH256 hash:
a919718aaeca6847a6c1289d55f4f3663f9cb3106ec5d1f1702567ac7c8e5c8b
MD5 hash:
8ffad92693024ca1759b2f87913ca4d0
SHA1 hash:
743f795efafb0b0efb8689f949e0180267db605f
SH256 hash:
ff39dfdbc3a13ccbc8686af405a26ad51b14885add4a4ebd83fcf8bd99c48add
MD5 hash:
81a9f3fb1cd093d8bd8e1acc362cf992
SHA1 hash:
a30a11263522de06360c50118f0b477a30216ed5
SH256 hash:
75ccfdf79e14495efe566513b0a937f1fe9f3e27f7174b27f70d110c811c562c
MD5 hash:
a757cb9baa683c2526045a30891fd96e
SHA1 hash:
849a62c4c401f7c2168424c7bc5f92f7a2d9f15b
SH256 hash:
22fe7d4c5606417510ed1e7b372ea39b6ad0091e6b70670d9054e889ef94c863
MD5 hash:
18400eec7d8723718e95023cd14aafc1
SHA1 hash:
7af652f8218a9ea7db8daaedb7d76fe0ded6f428
SH256 hash:
a919718aaeca6847a6c1289d55f4f3663f9cb3106ec5d1f1702567ac7c8e5c8b
MD5 hash:
8ffad92693024ca1759b2f87913ca4d0
SHA1 hash:
743f795efafb0b0efb8689f949e0180267db605f
SH256 hash:
fad14b2719f87e3e415053bfa8d15b44995d74df67d2b696d181f848eeb7f331
MD5 hash:
275764fb9cd9119d799cd8d532e2d6c4
SHA1 hash:
65ede052902b27488e5fccb487cbac6cc89d7e7e
SH256 hash:
2d8af4df6b01d7646163b30c58716ac625d2a7bcabc0fdc1237340d2e43b4b34
MD5 hash:
707172062bfbf73e44e90f5dea9c1e12
SHA1 hash:
b3275c93697c621ae4a6e2310f00397f1c64c02c
SH256 hash:
4cd1bd1f155c1bd6961abe7ab6301ffd3d4a77e77fd1e3845adc5c6f6a69d085
MD5 hash:
c68599c54f061b82b18e1392958d4e0e
SHA1 hash:
0c692795e9e156eaff69cbc30356b8d342c617fa
SH256 hash:
f867f80f9ebefbabb3baef1b042dc4ae17316439f3bb59c04c98e0556815873f
MD5 hash:
bbaabf290383c7d8ce317dba8abb22da
SHA1 hash:
24d65c7dc67052f316901eb2a520b5206a7ca454
SH256 hash:
59b3a5fe4d65ab21a4cd924debd29c23c7306dce8114d6395e28a6ed290e546a
MD5 hash:
581c22ce1ebe03cad057c702027d47b1
SHA1 hash:
a2ea77d76e5b3b55fdb80d7e74f536ceb9ab8369
SH256 hash:
e48666e32b20765c2155ac2c74c2cf20480a758fcaed58f621eaf963519daed3
MD5 hash:
95a2dd07a22ec2838fc61924a905111b
SHA1 hash:
0520b4a4955485944f97ab4be01aa61b96ceffd5
SH256 hash:
1bae3e3134d374748f6ff4bf0b4aeda42d92c0b94d0da9a49c084b9c8199b18b
MD5 hash:
9e610b4e8702546166d6bdd3d1248119
SHA1 hash:
2aa7bec98e57c87804b4d7927d7aa91a4f06070c
SH256 hash:
aa31b8817872a6b133c87bcc6227a52e35edeee71611cd193744db7b366c74a8
MD5 hash:
2f8f81430ae017be5684f0e6622a5e52
SHA1 hash:
3f9875d7cb8e8b09931e9fb0c7b62c9618843fdf
SH256 hash:
6017e80386e3ee694ea18aeac302f9d11161581100e6e866691778fd994c2496
MD5 hash:
aa5e94a6475357e261aa59ff6d6ef0a3
SHA1 hash:
989b8f2f1b500667d9000942a5ee1de7582f655a
SH256 hash:
c3c04edd6162561daf347eee27a6bc3d0f0594e411bc09e8f940de361f0cd7a9
MD5 hash:
a83318b42ce6bd132ab5addad37a5164
SHA1 hash:
5b66a0d08fc59436ce568063f6ef9eb481d19c39
SH256 hash:
235e174f899ee9a6af2790760d3ca02e17133313128e62b737954e2914e1dd39
MD5 hash:
ef5a1b55682d0fc52ec68c4f8fd4afa4
SHA1 hash:
900a17a18513a92513730f275a7802d33557b442
SH256 hash:
ca8e199d6dfcadb3495ce5eb9f3d5d4c1156ea9d0ff9cd612656c171e6bff346
MD5 hash:
e9aadd8a25a59dc15b6447a20c8c0ffd
SHA1 hash:
72cfb84078a26fe1dd6f6d5a53ee042564f9a700
SH256 hash:
02f41f4a5d17e6360c292793d7ba6b469af1e5086045c52fbf200f158fdb99af
MD5 hash:
19f903715fafc169ffdf29ec9ae6fe3a
SHA1 hash:
479232063a0b3476f004eed1445230c8abfcd2a4
SH256 hash:
68a8c7a88508f32f5daa26c4a0263abb3e37f508a064ee5d24822070892ff9e3
MD5 hash:
cbb37dc1bd814e288390dfa044a86f0f
SHA1 hash:
82f129ee2ad80755dfa10a15e1a8de1d707cd567
SH256 hash:
ff39dfdbc3a13ccbc8686af405a26ad51b14885add4a4ebd83fcf8bd99c48add
MD5 hash:
81a9f3fb1cd093d8bd8e1acc362cf992
SHA1 hash:
a30a11263522de06360c50118f0b477a30216ed5
SH256 hash:
75ccfdf79e14495efe566513b0a937f1fe9f3e27f7174b27f70d110c811c562c
MD5 hash:
a757cb9baa683c2526045a30891fd96e
SHA1 hash:
849a62c4c401f7c2168424c7bc5f92f7a2d9f15b
SH256 hash:
22fe7d4c5606417510ed1e7b372ea39b6ad0091e6b70670d9054e889ef94c863
MD5 hash:
18400eec7d8723718e95023cd14aafc1
SHA1 hash:
7af652f8218a9ea7db8daaedb7d76fe0ded6f428
SH256 hash:
a919718aaeca6847a6c1289d55f4f3663f9cb3106ec5d1f1702567ac7c8e5c8b
MD5 hash:
8ffad92693024ca1759b2f87913ca4d0
SHA1 hash:
743f795efafb0b0efb8689f949e0180267db605f
SH256 hash:
ff39dfdbc3a13ccbc8686af405a26ad51b14885add4a4ebd83fcf8bd99c48add
MD5 hash:
81a9f3fb1cd093d8bd8e1acc362cf992
SHA1 hash:
a30a11263522de06360c50118f0b477a30216ed5
SH256 hash:
75ccfdf79e14495efe566513b0a937f1fe9f3e27f7174b27f70d110c811c562c
MD5 hash:
a757cb9baa683c2526045a30891fd96e
SHA1 hash:
849a62c4c401f7c2168424c7bc5f92f7a2d9f15b
SH256 hash:
22fe7d4c5606417510ed1e7b372ea39b6ad0091e6b70670d9054e889ef94c863
MD5 hash:
18400eec7d8723718e95023cd14aafc1
SHA1 hash:
7af652f8218a9ea7db8daaedb7d76fe0ded6f428
SH256 hash:
a919718aaeca6847a6c1289d55f4f3663f9cb3106ec5d1f1702567ac7c8e5c8b
MD5 hash:
8ffad92693024ca1759b2f87913ca4d0
SHA1 hash:
743f795efafb0b0efb8689f949e0180267db605f
SH256 hash:
fad14b2719f87e3e415053bfa8d15b44995d74df67d2b696d181f848eeb7f331
MD5 hash:
275764fb9cd9119d799cd8d532e2d6c4
SHA1 hash:
65ede052902b27488e5fccb487cbac6cc89d7e7e
SH256 hash:
2d8af4df6b01d7646163b30c58716ac625d2a7bcabc0fdc1237340d2e43b4b34
MD5 hash:
707172062bfbf73e44e90f5dea9c1e12
SHA1 hash:
b3275c93697c621ae4a6e2310f00397f1c64c02c
SH256 hash:
4cd1bd1f155c1bd6961abe7ab6301ffd3d4a77e77fd1e3845adc5c6f6a69d085
MD5 hash:
c68599c54f061b82b18e1392958d4e0e
SHA1 hash:
0c692795e9e156eaff69cbc30356b8d342c617fa
SH256 hash:
f867f80f9ebefbabb3baef1b042dc4ae17316439f3bb59c04c98e0556815873f
MD5 hash:
bbaabf290383c7d8ce317dba8abb22da
SHA1 hash:
24d65c7dc67052f316901eb2a520b5206a7ca454
SH256 hash:
59b3a5fe4d65ab21a4cd924debd29c23c7306dce8114d6395e28a6ed290e546a
MD5 hash:
581c22ce1ebe03cad057c702027d47b1
SHA1 hash:
a2ea77d76e5b3b55fdb80d7e74f536ceb9ab8369
SH256 hash:
e48666e32b20765c2155ac2c74c2cf20480a758fcaed58f621eaf963519daed3
MD5 hash:
95a2dd07a22ec2838fc61924a905111b
SHA1 hash:
0520b4a4955485944f97ab4be01aa61b96ceffd5
SH256 hash:
1bae3e3134d374748f6ff4bf0b4aeda42d92c0b94d0da9a49c084b9c8199b18b
MD5 hash:
9e610b4e8702546166d6bdd3d1248119
SHA1 hash:
2aa7bec98e57c87804b4d7927d7aa91a4f06070c
SH256 hash:
aa31b8817872a6b133c87bcc6227a52e35edeee71611cd193744db7b366c74a8
MD5 hash:
2f8f81430ae017be5684f0e6622a5e52
SHA1 hash:
3f9875d7cb8e8b09931e9fb0c7b62c9618843fdf
SH256 hash:
6017e80386e3ee694ea18aeac302f9d11161581100e6e866691778fd994c2496
MD5 hash:
aa5e94a6475357e261aa59ff6d6ef0a3
SHA1 hash:
989b8f2f1b500667d9000942a5ee1de7582f655a
SH256 hash:
c3c04edd6162561daf347eee27a6bc3d0f0594e411bc09e8f940de361f0cd7a9
MD5 hash:
a83318b42ce6bd132ab5addad37a5164
SHA1 hash:
5b66a0d08fc59436ce568063f6ef9eb481d19c39
SH256 hash:
235e174f899ee9a6af2790760d3ca02e17133313128e62b737954e2914e1dd39
MD5 hash:
ef5a1b55682d0fc52ec68c4f8fd4afa4
SHA1 hash:
900a17a18513a92513730f275a7802d33557b442
SH256 hash:
ca8e199d6dfcadb3495ce5eb9f3d5d4c1156ea9d0ff9cd612656c171e6bff346
MD5 hash:
e9aadd8a25a59dc15b6447a20c8c0ffd
SHA1 hash:
72cfb84078a26fe1dd6f6d5a53ee042564f9a700
SH256 hash:
02f41f4a5d17e6360c292793d7ba6b469af1e5086045c52fbf200f158fdb99af
MD5 hash:
19f903715fafc169ffdf29ec9ae6fe3a
SHA1 hash:
479232063a0b3476f004eed1445230c8abfcd2a4
SH256 hash:
68a8c7a88508f32f5daa26c4a0263abb3e37f508a064ee5d24822070892ff9e3
MD5 hash:
cbb37dc1bd814e288390dfa044a86f0f
SHA1 hash:
82f129ee2ad80755dfa10a15e1a8de1d707cd567
SH256 hash:
5d47d5ad88c5d99cac3a860e682bb9542046e05ee33b3a4fd896db5464e7f0a6
MD5 hash:
7fdb00c80f0250575a05601c08627d50
SHA1 hash:
709a67ee148978a05bb3c3b530d68004c1eb5196
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Anydesk
Author:CD_R0M_
Description:Anydesk is commonly used by threat actors for remote access. This rule aims to identify legitimate anydesk, renamed binaries and trojanized versions.
Reference:https://www.crowdstrike.com/blog/falcon-complete-disrupts-malvertising-campaign-targeting-anydesk/
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 5d47d5ad88c5d99cac3a860e682bb9542046e05ee33b3a4fd896db5464e7f0a6

(this sample)

  
Delivery method
Distributed via web download

Comments