MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5ec112046c09ca54b9f8f4e63583f3688612ed3721dc676f6849d62e1b7584cc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 5ec112046c09ca54b9f8f4e63583f3688612ed3721dc676f6849d62e1b7584cc
SHA3-384 hash: 1454b772b752ce0bf3cca1c6b7586c45044a668194803f763d592f151e3df89ad347792ea5a93e15ff834d14909d2242
SHA1 hash: 88308b5ec22c319a51d8077346b9006673af5891
MD5 hash: c1d9f6c4c84646573f8f18337013fa76
humanhash: king-low-robin-zulu
File name:5ec112046c09ca54b9f8f4e63583f3688612ed3721dc676f6849d62e1b7584cc
Download: download sample
File size:167'936 bytes
First seen:2020-10-04 16:32:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcb00ff7789abce7ee6b60e23e5f1270
ssdeep 3072:FVMdMidQRadkWH7mRdmzaWb8gV6vTNHh4McvT:D4aRKHsdmuW4vTFGvvT
Threatray 2'489 similar samples on MalwareBazaar
TLSH D4F3052A59BE1B2BD170C7F2CFF5E0A7B880D17634119D6329BB971645278137A8323E
Reporter tildedennis
Tags:Chthonic


Avatar
tildedennis
chthonic version 2.4.11.0

Intelligence


File Origin
# of uploads :
1
# of downloads :
154
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Unauthorized injection to a recently created process
Launching a process
Creating a file
Windows shutdown
Possible injection to a system process
Unauthorized injection to a system process
Hiding the taskbar notifications
Hiding the Action Center notifications
Blocking the User Account Control
Blocking the Windows Security Center launch
Blocking Windows Firewall launch
Disabling the operating system update service
Enabling autorun
Deleting of the original file
Result
Threat name:
Unknown
Detection:
malicious
Classification:
phis.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Creates an undocumented autostart registry key
Deletes itself after installation
Detected unpacking (changes PE section rights)
Disables the phishing filter of internet explorer 8
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides the Windows control panel from the task bar
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.PonyStealer
Status:
Malicious
First seen:
2015-09-19 22:45:40 UTC
AV detection:
31 of 42 (73.81%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
persistence evasion trojan
Behaviour
Modifies Internet Explorer Phishing Filter
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Adds policy Run key to start application
Disables taskbar notifications via registry modification
UAC bypass
Unpacked files
SH256 hash:
5ec112046c09ca54b9f8f4e63583f3688612ed3721dc676f6849d62e1b7584cc
MD5 hash:
c1d9f6c4c84646573f8f18337013fa76
SHA1 hash:
88308b5ec22c319a51d8077346b9006673af5891
SH256 hash:
3b651f09bf11d8a140be824712ef60752a54d1ad9b58f8f7b80e937f4049dd55
MD5 hash:
4b2d8b17223c32bdd38f377ecc68cf5d
SHA1 hash:
9300a1224777d7ea2cbd34908c13b070e703a8b7
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments