MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 657aa81665835f9c9ebe28e9a54c583e123498fd1284511ed95568b7d0597a55. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 8
| SHA256 hash: | 657aa81665835f9c9ebe28e9a54c583e123498fd1284511ed95568b7d0597a55 |
|---|---|
| SHA3-384 hash: | c64b06548a2c1caff59b949efeed4e28d3a63db722fedbb11b9d70a5b4557fde3680df01a0dbdb34d93640c0a17247cf |
| SHA1 hash: | ced70c9a831b8f5dcc626cf628401a310f1c4eae |
| MD5 hash: | 63f570204a3ffd852b2e75d03e001501 |
| humanhash: | mars-jupiter-nevada-william |
| File name: | 63f57020_by_Libranalysis |
| Download: | download sample |
| File size: | 4'573'916 bytes |
| First seen: | 2021-04-27 23:00:53 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 25890460a2b98652bed7ba240be2c1d7 (3 x TVRat, 1 x AsyncRAT, 1 x Socks5Systemz) |
| ssdeep | 49152:IEdLZjkymP8DEovU85BuTAdMg1khFtPfFwyUF1EJr8z6JsGRMbGQDCDSj0vw30fA:IWkTTsjdsfdzM1cqTGR6DL7cyT |
| Threatray | 13 similar samples on MalwareBazaar |
| TLSH | 97263307DBAC8C3BE14453703C758CB3EDEBB5593C758A8C224B24BD590E6A16E4DA1B |
| Reporter |
Intelligence
File Origin
# of uploads :
1
# of downloads :
94
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
63f57020_by_Libranalysis
Verdict:
Malicious activity
Analysis date:
2021-04-27 23:07:13 UTC
Tags:
installer teamviewer tvrat rat
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Sending a UDP request
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Moving a file to the %temp% subdirectory
Deleting a recently created file
Running batch commands
Creating a process with a hidden window
Launching a process
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Modifying a system file
Changing a file
Using the Windows Management Instrumentation requests
Searching for the window
DNS request
Sending a custom TCP request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
96 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to detect sleep reduction / modifications
Drops batch files with force delete cmd (self deletion)
Monitors registry run keys for changes
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample is not signed and drops a device driver
Behaviour
Behavior Graph:
Threat name:
Win32.Virus.TheRat
Status:
Malicious
First seen:
2021-03-31 19:18:23 UTC
AV detection:
16 of 44 (36.36%)
Threat level:
5/5
Verdict:
malicious
Similar samples:
+ 3 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
8/10
Tags:
persistence spyware stealer
Behaviour
Enumerates system info in registry
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Adds Run key to start application
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Unpacked files
SH256 hash:
ad7b3af5709e5febc6313696c5f159c895b2785e658028e9500352980dce1c36
MD5 hash:
4fa33f0c32e3232be03aaaeb01633016
SHA1 hash:
3dbab4931922a57fa93c49377b67cf5316cfa766
SH256 hash:
e670a66243c2765aa65d92072a813b1ca09948a85559e322980068b34d65e97d
MD5 hash:
586bc9fb39812ee8c9aa7ef0455ca5ce
SHA1 hash:
4546e0d29e07fd43b16829d3da9673b4f62fd665
SH256 hash:
13d99be3f48e56cb9897fab6ecbb0245fc14ec9df08fb7ea508acde0624af960
MD5 hash:
51c881a274269d74dc5055cd4b6b4ca5
SHA1 hash:
b6e3b843fd6a442b30292f6d2cb011f9b8e6066e
SH256 hash:
31d66f9da7f6ef0abef8be6306b28cbe014674f8860cf276738e91eb19f7240f
MD5 hash:
fa3f0e99b7dac6fce5dd69a0f8b12062
SHA1 hash:
9be18d769c400296e68f0d87889021f14046b4b7
SH256 hash:
6b7430b33f6bfc3a3f7cdc997659a730fe7049677f87ec93163b78d0a5d097d7
MD5 hash:
18fe220e3342bbf8d9eb583459eeb559
SHA1 hash:
239b643f6715f04a47684f72995b93bc3277ee81
SH256 hash:
e6bc2f12a1aba3105779f24640f090425fe55af0d2bb47b4cd1281d66f2113df
MD5 hash:
e46ba46dd0bc1d58829ae681fad78020
SHA1 hash:
f44bffeb53642074663ece4a7c1227943eb053e0
SH256 hash:
4de3c608f7c2c3e4e1bd8e8602284fde3bdeef7f6bb5f95eebb4aa47a587bf2d
MD5 hash:
d48b5ae0f402a2702115d669f5d40e3e
SHA1 hash:
6cd9e1d2cfde6a534784f84d046f5ab2fa822191
SH256 hash:
c1aef16ec59ee3871a2adb82620177de1f1dd967c89647fe6b0534cb41935af5
MD5 hash:
901a18890eff8211dc8f5b016641ba7c
SHA1 hash:
a8c4700390fc5d0838c6e1f1d6d08f0616eda8af
SH256 hash:
657aa81665835f9c9ebe28e9a54c583e123498fd1284511ed95568b7d0597a55
MD5 hash:
63f570204a3ffd852b2e75d03e001501
SHA1 hash:
ced70c9a831b8f5dcc626cf628401a310f1c4eae
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Trojan
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0001.025] Anti-Behavioral Analysis::Software Breakpoints
1) [B0009.029] Anti-Behavioral Analysis::Instruction Testing
2) [B0009] Anti-Behavioral Analysis::Virtual Machine Detection
3) [C0021] Cryptography Micro-objective::Generate Pseudo-random Sequence
4) [C0032.001] Data Micro-objective::CRC32::Checksum
5) [C0026.002] Data Micro-objective::XOR::Encode Data
7) [C0046] File System Micro-objective::Create Directory
8) [C0048] File System Micro-objective::Delete Directory
9) [C0047] File System Micro-objective::Delete File
10) [C0049] File System Micro-objective::Get File Attributes
11) [C0051] File System Micro-objective::Read File
12) [C0052] File System Micro-objective::Writes File
13) [C0007] Memory Micro-objective::Allocate Memory
14) [C0036.004] Operating System Micro-objective::Create Registry Key::Registry
15) [C0036.003] Operating System Micro-objective::Open Registry Key::Registry
16) [C0036.006] Operating System Micro-objective::Query Registry Value::Registry
17) [C0017.003] Process Micro-objective::Create Suspended Process::Create Process
18) [C0017] Process Micro-objective::Create Process
19) [C0041] Process Micro-objective::Set Thread Local Storage Value
20) [C0018] Process Micro-objective::Terminate Process