MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 64baa604001b64764cb7aae4019abc73929ea59965fba733871e5e17377b1b84. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Kovter


Vendor detections: 8


Intelligence 8 IOCs YARA 2 File information Comments

SHA256 hash: 64baa604001b64764cb7aae4019abc73929ea59965fba733871e5e17377b1b84
SHA3-384 hash: 790fe9d9df814976580b758bbfd8b9e908cd9e6cf7304fa1169b33b0d6bd112054156726d6059fbc4f38e9f01d0bfbaf
SHA1 hash: fdaea19e30073ebff1c11217edfa088966234a3a
MD5 hash: ea54dcc2052880263e2ead168a2af2a3
humanhash: lake-triple-edward-alaska
File name:64baa604001b64764cb7aae4019abc73929ea59965fba733871e5e17377b1b84
Download: download sample
Signature Kovter
File size:337'848 bytes
First seen:2020-11-11 11:29:26 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 517341ae1ccc6afec85c307c3a906f58 (2 x Kovter, 1 x Heodo)
ssdeep 6144:8+0sDNvsWBJ/f11s+J7xmGm0O36kQ2XBKnouECmg/4FhC/4a3KQiK:Z0OJ79f11s+dxm936k1C9wFhP6gK
Threatray 2 similar samples on MalwareBazaar
TLSH 8074F2CBD38581F1F59F71FA1C9AA13FCB5299C756568A8383E4CF967AB31428C4A130
Reporter seifreed
Tags:Kovter

Intelligence


File Origin
# of uploads :
1
# of downloads :
1'686
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Using the Windows Management Instrumentation requests
Launching a process
Creating a window
Creating a process with a hidden window
Sending a UDP request
Creating a file
Searching for the window
Connection attempt
Possible injection to a system process
Changing settings of the browser security zones
Enabling autorun with the shell\open\command registry branches
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Deleting of the original file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
80 / 100
Signature
Antivirus / Scanner detection for submitted sample
Creates processes via WMI
Found suspicious powershell code related to unpacking or dynamic code loading
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Sigma detected: MSHTA Spawning Windows Shell
Suspicious powershell command line found
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 315418 Sample: 7i5iVT386a Startdate: 12/11/2020 Architecture: WINDOWS Score: 80 17 Antivirus / Scanner detection for submitted sample 2->17 19 Multi AV Scanner detection for submitted file 2->19 21 Suspicious powershell command line found 2->21 23 3 other signatures 2->23 7 mshta.exe 19 2->7         started        10 7i5iVT386a.exe 6 2->10         started        process3 signatures4 25 Suspicious powershell command line found 7->25 12 powershell.exe 18 7->12         started        27 Creates processes via WMI 10->27 process5 signatures6 29 Found suspicious powershell code related to unpacking or dynamic code loading 12->29 15 conhost.exe 12->15         started        process7
Threat name:
Win32.Dropper.Powerliks
Status:
Malicious
First seen:
2020-11-11 11:32:36 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in System32 directory
Process spawned unexpected child process
Unpacked files
SH256 hash:
64baa604001b64764cb7aae4019abc73929ea59965fba733871e5e17377b1b84
MD5 hash:
ea54dcc2052880263e2ead168a2af2a3
SHA1 hash:
fdaea19e30073ebff1c11217edfa088966234a3a
SH256 hash:
59fe8fc88de7a050187ce84d07df6a95179007886c9293d39ca28f40b42d2acf
MD5 hash:
8ea2a4d9b98feebc11848bf1a2ecf521
SHA1 hash:
7fdaaf027b755eb23bbed7b37a1d9017158c8dec
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Win32_Ransomware_Kovter
Author:ReversingLabs
Description:Yara rule that detects Kovter ransomware.
Rule name:win_kovter_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments