MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 61d4ffa8f628b886b63e70a83fc7fcaf89cfe976ef1554f20d481487e5da94fe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 61d4ffa8f628b886b63e70a83fc7fcaf89cfe976ef1554f20d481487e5da94fe
SHA3-384 hash: 6eae740dbc7b76d558afd252e376b8a3fb36ad2c224fe9cdd0c815d9480985bbd1238505937cf18dd020bf26d5dfed28
SHA1 hash: 9ddf88b0a022e6ca1e70f450126b6d3c27cbb573
MD5 hash: a4eeeca0638de7188fc51993ded01fea
humanhash: alanine-xray-maryland-march
File name:7bca80dd5c19443aa59f1e1d32a14986
Download: download sample
File size:1'092'333 bytes
First seen:2020-11-17 12:33:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (865 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 24576:tShXwXYhTWQ7Bztebqn8dn85i1GIS5nqKWddT/hl9:2X1z0bmen31GpnqKydThl9
Threatray 302 similar samples on MalwareBazaar
TLSH 31351241FAC1C8B2D973083256289B59693DBC311F39DDABB7E43E0DD630590A664BB3
Reporter seifreed

Intelligence


File Origin
# of uploads :
1
# of downloads :
52
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Creating a file
Creating a process from a recently created file
Running batch commands
Creating a process with a hidden window
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a recently created process
Threat name:
Win32.Trojan.Ymacco
Status:
Malicious
First seen:
2020-11-17 12:37:50 UTC
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery evasion spyware trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Looks up external IP address via web service
Loads dropped DLL
Reads user/profile data of web browsers
Windows security modification
Executes dropped EXE
Modifies Windows Defender Real-time Protection settings
Unpacked files
SH256 hash:
61d4ffa8f628b886b63e70a83fc7fcaf89cfe976ef1554f20d481487e5da94fe
MD5 hash:
a4eeeca0638de7188fc51993ded01fea
SHA1 hash:
9ddf88b0a022e6ca1e70f450126b6d3c27cbb573
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments