MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 61a70fdae6040d08c4f66f5d5ba95aba1987cda5e4715903696c3139a33d8e05. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 61a70fdae6040d08c4f66f5d5ba95aba1987cda5e4715903696c3139a33d8e05
SHA3-384 hash: 6551dc9b5aebe47623a33e33c71fe85a4e598dfc7c563101da53a75f4b6477229c69f016f64adaefd5a0d8b9ddca654f
SHA1 hash: e34be4878b38bc4ca11162eef0430bb776da8795
MD5 hash: 37dd37036261a48f03938339d7990506
humanhash: white-batman-echo-blue
File name:61a70fdae6040d08c4f66f5d5ba95aba1987cda5e4715903696c3139a33d8e05
Download: download sample
File size:10'348'544 bytes
First seen:2021-03-02 13:27:31 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d59a4a699610169663a929d37c90be43 (76 x DCRat, 22 x njrat, 17 x SalatStealer)
ssdeep 196608:fIkiiWjb2uEMYBNqHEyEJhu2Jzcd/5E+mDW8W4X1dh0xiy0CxorHsV:9iiOb2YuNqkyEJg2Zcd/63DW8lFLo0Cb
TLSH B3A623FA3188B750C02F85746416F929A3793C0F8EA1DB7EBACA7DC57B762109504B4B
Reporter c3rb3ru5d3d53c2


Avatar
c3rb3ru5d3d53c
@c3rb3ru5d3d53c Live Hunt

Intelligence


File Origin
# of uploads :
1
# of downloads :
120
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
memetapp.exe
Verdict:
Malicious activity
Analysis date:
2021-02-26 06:08:38 UTC
Tags:
installer rat backdoor dcrat trojan evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a window
Searching for the window
Creating a file
Running batch commands
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Sending a UDP request
Launching a process
Creating a file in the Program Files subdirectories
DNS request
Sending an HTTP GET request
Sending a custom TCP request
Unauthorized injection to a recently created process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains in memory code execution
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Creates files inside the volume driver (system volume information)
Creates files with lurking names (e.g. Crack.exe)
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sigma detected: System File Execution Location Anomaly
Tries to detect debuggers (CloseHandle check)
Tries to detect debuggers by setting the trap flag for special instructions
Tries to detect virtualization through RDTSC time measurements
Uses schtasks.exe or at.exe to add and modify task schedules
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 360938 Sample: ezFdi1Q4Fx Startdate: 02/03/2021 Architecture: WINDOWS Score: 100 87 Antivirus detection for dropped file 2->87 89 Antivirus / Scanner detection for submitted sample 2->89 91 Multi AV Scanner detection for submitted file 2->91 93 8 other signatures 2->93 11 ezFdi1Q4Fx.exe 3 2->11         started        15 lsass.exe 3 2->15         started        17 OdqqCDSrpGaqSrve.exe 3 2->17         started        process3 file4 61 C:\Users\user\AppData\...\onetapv4crack.exe, PE32 11->61 dropped 63 C:\Users\user\AppData\Local\Temp\Onetap.exe, PE32+ 11->63 dropped 115 Creates files with lurking names (e.g. Crack.exe) 11->115 19 onetapv4crack.exe 3 6 11->19         started        23 Onetap.exe 6 11->23         started        117 Antivirus detection for dropped file 15->117 119 Machine Learning detection for dropped file 15->119 121 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 15->121 signatures5 process6 dnsIp7 59 C:\monitorhost\dhcpsession.exe, PE32 19->59 dropped 95 Multi AV Scanner detection for dropped file 19->95 97 Machine Learning detection for dropped file 19->97 26 wscript.exe 1 19->26         started        77 www.cloudflare.com 23->77 99 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 23->99 101 Tries to detect debuggers by setting the trap flag for special instructions 23->101 103 Tries to detect debuggers (CloseHandle check) 23->103 105 2 other signatures 23->105 file8 signatures9 process10 signatures11 113 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 26->113 29 cmd.exe 1 26->29         started        process12 process13 31 dhcpsession.exe 1 15 29->31         started        35 conhost.exe 29->35         started        file14 65 C:\monitorhost\ShellExperienceHost.exe, PE32 31->65 dropped 67 C:\Windows\ShellExperiences\SgrmBroker.exe, PE32 31->67 dropped 69 C:\WindowsLAMBKUP\RuntimeBroker.exe, PE32 31->69 dropped 71 3 other malicious files 31->71 dropped 79 Antivirus detection for dropped file 31->79 81 Creates files inside the volume driver (system volume information) 31->81 83 Machine Learning detection for dropped file 31->83 85 4 other signatures 31->85 37 RuntimeBroker.exe 31->37         started        41 schtasks.exe 1 31->41         started        43 schtasks.exe 1 31->43         started        45 4 other processes 31->45 signatures15 process16 dnsIp17 73 a0518199.xsph.ru 141.8.192.26, 49705, 80 SPRINTHOSTRU Russian Federation 37->73 75 ipinfo.io 216.239.32.21, 443, 49707 GOOGLEUS United States 37->75 107 Antivirus detection for dropped file 37->107 109 Machine Learning detection for dropped file 37->109 111 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 37->111 47 conhost.exe 41->47         started        49 conhost.exe 43->49         started        51 conhost.exe 45->51         started        53 conhost.exe 45->53         started        55 conhost.exe 45->55         started        57 conhost.exe 45->57         started        signatures18 process19
Threat name:
Win32.Trojan.Delf
Status:
Malicious
First seen:
2021-03-02 13:28:08 UTC
AV detection:
39 of 47 (82.98%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
Creates scheduled task(s)
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Looks up external IP address via web service
Loads dropped DLL
Executes dropped EXE
UPX packed file
Unpacked files
SH256 hash:
2b3424629d6a124d8a0336547ce0ee1fb2a09bd60c3939d51c798578e4bf7596
MD5 hash:
dc4830a3b6c1066266f4087428b0ec80
SHA1 hash:
b530f199b689facc260500227e241cbcc6d4faa5
SH256 hash:
6a82ec8722a0eb79adcf0d0cd276ac2d7b1738b1fea3ff8313b36afb6e94896e
MD5 hash:
3bb583c5abbb692d018fbdf9b7539fee
SHA1 hash:
05ada4e882150bd2e9b509efff32187584e45688
SH256 hash:
61a70fdae6040d08c4f66f5d5ba95aba1987cda5e4715903696c3139a33d8e05
MD5 hash:
37dd37036261a48f03938339d7990506
SHA1 hash:
e34be4878b38bc4ca11162eef0430bb776da8795
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments