MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 5ec112046c09ca54b9f8f4e63583f3688612ed3721dc676f6849d62e1b7584cc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 5
| SHA256 hash: | 5ec112046c09ca54b9f8f4e63583f3688612ed3721dc676f6849d62e1b7584cc |
|---|---|
| SHA3-384 hash: | 1454b772b752ce0bf3cca1c6b7586c45044a668194803f763d592f151e3df89ad347792ea5a93e15ff834d14909d2242 |
| SHA1 hash: | 88308b5ec22c319a51d8077346b9006673af5891 |
| MD5 hash: | c1d9f6c4c84646573f8f18337013fa76 |
| humanhash: | king-low-robin-zulu |
| File name: | 5ec112046c09ca54b9f8f4e63583f3688612ed3721dc676f6849d62e1b7584cc |
| Download: | download sample |
| File size: | 167'936 bytes |
| First seen: | 2020-10-04 16:32:38 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | fcb00ff7789abce7ee6b60e23e5f1270 |
| ssdeep | 3072:FVMdMidQRadkWH7mRdmzaWb8gV6vTNHh4McvT:D4aRKHsdmuW4vTFGvvT |
| Threatray | 2'489 similar samples on MalwareBazaar |
| TLSH | D4F3052A59BE1B2BD170C7F2CFF5E0A7B880D17634119D6329BB971645278137A8323E |
| Reporter | |
| Tags: | Chthonic |
Intelligence
File Origin
# of uploads :
1
# of downloads :
154
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Sending a UDP request
Unauthorized injection to a recently created process
Launching a process
Creating a file
Windows shutdown
Possible injection to a system process
Unauthorized injection to a system process
Hiding the taskbar notifications
Hiding the Action Center notifications
Blocking the User Account Control
Blocking the Windows Security Center launch
Blocking Windows Firewall launch
Disabling the operating system update service
Enabling autorun
Deleting of the original file
Result
Threat name:
Unknown
Detection:
malicious
Classification:
phis.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Creates an undocumented autostart registry key
Deletes itself after installation
Detected unpacking (changes PE section rights)
Disables the phishing filter of internet explorer 8
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides the Windows control panel from the task bar
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.PonyStealer
Status:
Malicious
First seen:
2015-09-19 22:45:40 UTC
AV detection:
31 of 42 (73.81%)
Threat level:
5/5
Verdict:
suspicious
Similar samples:
+ 2'479 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
10/10
Tags:
persistence evasion trojan
Behaviour
Modifies Internet Explorer Phishing Filter
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Adds policy Run key to start application
Disables taskbar notifications via registry modification
UAC bypass
Unpacked files
SH256 hash:
5ec112046c09ca54b9f8f4e63583f3688612ed3721dc676f6849d62e1b7584cc
MD5 hash:
c1d9f6c4c84646573f8f18337013fa76
SHA1 hash:
88308b5ec22c319a51d8077346b9006673af5891
SH256 hash:
3b651f09bf11d8a140be824712ef60752a54d1ad9b58f8f7b80e937f4049dd55
MD5 hash:
4b2d8b17223c32bdd38f377ecc68cf5d
SHA1 hash:
9300a1224777d7ea2cbd34908c13b070e703a8b7
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Trojan
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.