MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5f16f8758d3b7a83c2edc2a238c741ef2c92a3042d887d1e26c77fd759e222a2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 5f16f8758d3b7a83c2edc2a238c741ef2c92a3042d887d1e26c77fd759e222a2
SHA3-384 hash: 4dca85a4a19a9dd8a90dbced715b4148b9e17f9bb6a7548ef69c4d4d86b3e49df56a73622d2938da272fba387531f45b
SHA1 hash: 97e1a70f26bdcca12e55fcffbb57e0808fa50a89
MD5 hash: 8e891111f82121d26353db13692e5d1b
humanhash: minnesota-california-three-king
File name:SecuriteInfo.com.Trojan.BRMon.Gen.4.31948.21551
Download: download sample
File size:432'640 bytes
First seen:2020-08-15 16:30:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 43cfdbc4c41a85b5855a61f0541150b1
ssdeep 12288:0c8/83r22J7pJJ3rRlD84yqYRJbthXesx3PBhtTI:0c8UZhfB784D8Rh3x/BT0
Threatray 1 similar samples on MalwareBazaar
TLSH D094E06AB6F1C431F3F30A345E34D7511ABFB9B25A31858F7294164E1E606C09EB2B27
Reporter SecuriteInfoCom

Intelligence


File Origin
# of uploads :
1
# of downloads :
79
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
Creating a window
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
60 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 268425 Sample: SecuriteInfo.com.Trojan.BRM... Startdate: 17/08/2020 Architecture: WINDOWS Score: 60 19 startprojekt.xyz 2->19 23 Machine Learning detection for sample 2->23 7 SecuriteInfo.com.Trojan.BRMon.Gen.4.31948.exe 2->7         started        signatures3 process4 dnsIp5 21 startprojekt.xyz 7->21 25 Detected unpacking (changes PE section rights) 7->25 27 Detected unpacking (overwrites its own PE header) 7->27 11 WerFault.exe 9 7->11         started        13 WerFault.exe 9 7->13         started        15 WerFault.exe 9 7->15         started        17 WerFault.exe 20 9 7->17         started        signatures6 process7
Threat name:
Win32.Trojan.Sodinok
Status:
Malicious
First seen:
2019-08-03 14:47:06 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
spyware discovery
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks installed software on the system
Checks installed software on the system
Reads user/profile data of web browsers
Reads user/profile data of web browsers
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 5f16f8758d3b7a83c2edc2a238c741ef2c92a3042d887d1e26c77fd759e222a2

(this sample)

  
Delivery method
Distributed via web download

Comments