MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 65cfbc6bf37685996beff8734ddb7df6db502be6a4f6b9d2ab01a6d9bda33898. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA 10 File information Comments

SHA256 hash: 65cfbc6bf37685996beff8734ddb7df6db502be6a4f6b9d2ab01a6d9bda33898
SHA3-384 hash: e33c62ca7d873cd86146fd538f2a918123659a65c77940cbe13cd6a2f9a2d7eae5eaa5a60aceb567b70c8861e09d4039
SHA1 hash: 406998490e7ee2fce78ad91f0c650f3eda6a3f89
MD5 hash: 3c6a70b2f841503980b9ebbd3d49717d
humanhash: two-batman-magazine-johnny
File name:SecuriteInfo.com.Win64.MalwareX-gen.29154.25409
Download: download sample
File size:4'469'979 bytes
First seen:2025-05-16 07:31:07 UTC
Last seen:2025-05-16 08:29:29 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 380e6757582731ea614f4f226e5a2d10
ssdeep 49152:5AOOsd2+05XfilqUrIqCtwqojyotYoqcYmkkZ4uq30oUjmnlyUE0LgqmD2lvm6qm:5VrxZ4uq30oUjmnlyUE0LgqmD71pwnL
TLSH T1AC264B6396D74CB9C9D7A7B476C313766738FC248F396A2F5604C9212E43AC06E1EB90
TrID 41.1% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
26.1% (.EXE) Win64 Executable (generic) (10522/11/4)
12.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.1% (.ICL) Windows Icons Library (generic) (2059/9)
5.0% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter SecuriteInfoCom
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
485
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Win64.MalwareX-gen.29154.25409
Verdict:
Malicious activity
Analysis date:
2025-05-16 07:47:30 UTC
Tags:
loader python ims-api generic

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
infosteal trojan extens virus
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file
Creating a window
DNS request
Connection attempt
Sending an HTTP GET request
Сreating synchronization primitives
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the %temp% directory
Unauthorized injection to a recently created process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug crypto expand hacktool lolbin overlay overlay packed zero
Verdict:
Malicious
Labled as:
HVM:TrojanDownloader/Small.gen
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Contains functionality to steal Chrome passwords or cookies
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Reads the Security eventlog
Reads the System eventlog
Suricata IDS alerts for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Uses the Telegram API (likely for C&C communication)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1691448 Sample: SecuriteInfo.com.Win64.Malw... Startdate: 16/05/2025 Architecture: WINDOWS Score: 100 65 api.telegram.org 2->65 67 mosssyoak.online 2->67 73 Suricata IDS alerts for network traffic 2->73 75 Malicious sample detected (through community Yara rule) 2->75 77 Multi AV Scanner detection for dropped file 2->77 81 4 other signatures 2->81 9 SecuriteInfo.com.Win64.MalwareX-gen.29154.25409.exe 37 2->9         started        14 cmd.exe 2 2->14         started        16 cmd.exe 1 2->16         started        18 cmd.exe 2->18         started        signatures3 79 Uses the Telegram API (likely for C&C communication) 65->79 process4 dnsIp5 69 mosssyoak.online 23.254.224.6, 49715, 49716, 49717 HOSTWINDSUS United States 9->69 71 api.telegram.org 149.154.167.220 TELEGRAMRU United Kingdom 9->71 57 C:\winx64\sucontext.exe, PE32+ 9->57 dropped 59 C:\winx64\User.exe, PE32+ 9->59 dropped 61 C:\winx64\OneNote.exe, PE32+ 9->61 dropped 63 7 other malicious files 9->63 dropped 97 Contains functionality to steal Chrome passwords or cookies 9->97 99 Tries to harvest and steal browser information (history, passwords, etc) 9->99 20 User.exe 59 9->20         started        23 Explore.exe 9->23         started        25 Notepad.exe 27 9->25         started        28 OneNote.exe 9->28         started        30 conhost.exe 14->30         started        32 sucontext.exe 1 14->32         started        34 conhost.exe 16->34         started        36 sucontext.exe 1 16->36         started        38 2 other processes 18->38 file6 signatures7 process8 file9 49 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 20->49 dropped 51 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+ 20->51 dropped 53 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+ 20->53 dropped 55 54 other malicious files 20->55 dropped 40 User.exe 20->40         started        43 Notepad.exe 23->43         started        91 Loading BitLocker PowerShell Module 25->91 93 Reads the Security eventlog 25->93 95 Reads the System eventlog 25->95 45 conhost.exe 25->45         started        signatures10 process11 signatures12 83 Tries to harvest and steal browser information (history, passwords, etc) 40->83 85 Loading BitLocker PowerShell Module 43->85 87 Reads the Security eventlog 43->87 89 Reads the System eventlog 43->89 47 conhost.exe 43->47         started        process13
Threat name:
Win64.Trojan.Kepavll
Status:
Malicious
First seen:
2025-05-16 03:21:16 UTC
File Type:
PE+ (Exe)
AV detection:
21 of 37 (56.76%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
pyinstaller spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Detects Pyinstaller
Embeds OpenSSL
Enumerates physical storage devices
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
65cfbc6bf37685996beff8734ddb7df6db502be6a4f6b9d2ab01a6d9bda33898
MD5 hash:
3c6a70b2f841503980b9ebbd3d49717d
SHA1 hash:
406998490e7ee2fce78ad91f0c650f3eda6a3f89
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_OutputDebugStringA_iat
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:ldpreload
Author:xorseed
Reference:https://stuff.rop.io/
Rule name:pe_detect_tls_callbacks
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Rooter
Author:Seth Hardy
Description:Rooter
Rule name:RooterStrings
Author:Seth Hardy
Description:Rooter Identifying Strings
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 65cfbc6bf37685996beff8734ddb7df6db502be6a4f6b9d2ab01a6d9bda33898

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
Reviews
IDCapabilitiesEvidence
DP_APIUses DP APICRYPT32.dll::CryptUnprotectData
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteA
URL_MONIKERS_APICan Download & Execute componentsurlmon.dll::URLDownloadToFileA
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WINHTTP.dll::WinHttpCloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetDiskFreeSpaceA
KERNEL32.dll::GetDiskFreeSpaceW
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileW
KERNEL32.dll::CreateDirectoryA
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileA
KERNEL32.dll::CreateFileMappingA
KERNEL32.dll::CreateFileMappingW
KERNEL32.dll::CreateFileW
WIN_BCRYPT_APICan Encrypt Filesbcrypt.dll::BCryptDecrypt
bcrypt.dll::BCryptDestroyKey
bcrypt.dll::BCryptGenerateSymmetricKey
bcrypt.dll::BCryptOpenAlgorithmProvider
bcrypt.dll::BCryptSetProperty
bcrypt.dll::BCryptCloseAlgorithmProvider
WIN_CRYPT_APIUses Windows Crypt APICRYPT32.dll::CryptBinaryToStringA
WIN_HTTP_APIUses HTTP servicesWINHTTP.dll::WinHttpConnect
WINHTTP.dll::WinHttpOpen
WINHTTP.dll::WinHttpOpenRequest
WINHTTP.dll::WinHttpReceiveResponse
WINHTTP.dll::WinHttpSendRequest

Comments