MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5de88c3cd7bc2693f457838db811e28f744b221f074c1657cee397a0a5ae33b2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 5de88c3cd7bc2693f457838db811e28f744b221f074c1657cee397a0a5ae33b2
SHA3-384 hash: 3f862ec08082f40e11ad2f5aa78f0f93faf4a66e1792b59458757417581bd9a480d09e4518bbb2e050482699b7c71a68
SHA1 hash: 1e759728193a162c9862b00de29565161ffa3031
MD5 hash: e4e63bd0e98557ddcc77816ee482dc0e
humanhash: tennessee-jersey-arizona-mockingbird
File name:ARSİ TURİZM SANAYİ Order OCT 2020.scr
Download: download sample
File size:52'168 bytes
First seen:2020-10-13 10:42:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'602 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 768:jIKUbKmAlu3hlOamiyIQHCXELqHBr0nVlbCUf2h3:jIDKmAQ9mFaEOr0nVQUfy
Threatray 8 similar samples on MalwareBazaar
TLSH 11334F9DA788DE43EA79B7341ADB849102F064B3A632C365AFED1ED0F9711185E0DE07
Reporter abuse_ch
Tags:geo scr TUR


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: pas0.g1economia.com
Sending IP: 45.84.196.87
From: Erdal AYDIN <offices@g1economia.com>
Subject: ARSİ TURİZM Order - OCT2020
Attachment: ARSI TURIZM SANAYI Order OCT 2020.7z (contains "ARSİ TURİZM SANAYİ Order OCT 2020.scr")

Intelligence


File Origin
# of uploads :
1
# of downloads :
96
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a process with a hidden window
Sending a UDP request
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Masson
Status:
Malicious
First seen:
2020-10-13 10:15:32 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Delays execution with timeout.exe
Modifies system certificate store
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
5de88c3cd7bc2693f457838db811e28f744b221f074c1657cee397a0a5ae33b2
MD5 hash:
e4e63bd0e98557ddcc77816ee482dc0e
SHA1 hash:
1e759728193a162c9862b00de29565161ffa3031
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe 5de88c3cd7bc2693f457838db811e28f744b221f074c1657cee397a0a5ae33b2

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments