MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6618359d4d19997728359453b0598be7562c293ef9d6ac51f2635586096a52bd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cutwail


Vendor detections: 14


Intelligence 14 IOCs YARA File information Comments

SHA256 hash: 6618359d4d19997728359453b0598be7562c293ef9d6ac51f2635586096a52bd
SHA3-384 hash: 6526d965bd8e30c18f677131b03dd9d9e068d23a4f1e363bac8a5834a6ee1f5cdaf77bd1436cd1a57ab923e4074fd975
SHA1 hash: fec43c982b497f4ddbb8c35245c295355676a07a
MD5 hash: 3e7a4148f1133cb4b8a097fd74590f44
humanhash: juliet-hotel-salami-solar
File name:3e7a4148f1133cb4b8a097fd74590f44.exe
Download: download sample
Signature Cutwail
File size:153'884 bytes
First seen:2023-03-10 06:53:01 UTC
Last seen:2023-03-10 08:31:05 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6e4f30e5ff96a025a586abf0edae33b8 (1 x Cutwail)
ssdeep 1536:nHcXFmx32TcZ8BCNDoeRHRQEQcUgaZutJ3gZNGxFh+Lx5s+5DFB+Er/qObMg8:H7gcNDnxQEdUStJ3gyxX+LU6iEr/qOK
Threatray 14 similar samples on MalwareBazaar
TLSH T18BE34BD6BFC91D8BE725423EDCEAD352623EF6F50A821F13242949771B325952EC0287
TrID 32.2% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
20.5% (.EXE) Win64 Executable (generic) (10523/12/4)
12.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
9.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:Cutwail exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
223
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
3e7a4148f1133cb4b8a097fd74590f44.exe
Verdict:
Malicious activity
Analysis date:
2023-03-10 06:58:30 UTC
Tags:
opendir

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Сreating synchronization primitives
Creating a file
Enabling the 'hidden' option for recently created files
DNS request
Sending an HTTP POST request
Launching a process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Sending an HTTP POST request to an infection source
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug anti-vm cutwail emotet overlay packed spyeye
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Send many emails (e-Mail Spam)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to resolve many domain names, but no domain seems valid
Writes to foreign memory regions
Yara detected Backdoor Pushdo
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 823805 Sample: iJzpyjAehB.exe Startdate: 10/03/2023 Architecture: WINDOWS Score: 100 63 yoruksut.com 2->63 65 ymlp15.net 2->65 67 332 other IPs or domains 2->67 107 Snort IDS alert for network traffic 2->107 109 Antivirus detection for URL or domain 2->109 111 Multi AV Scanner detection for submitted file 2->111 117 2 other signatures 2->117 8 iJzpyjAehB.exe 3 68 2->8         started        13 pigalicapi.exe 48 2->13         started        15 pigalicapi.exe 49 2->15         started        signatures3 113 Tries to resolve many domain names, but no domain seems valid 63->113 115 System process connects to network (likely due to code injection or exploit) 65->115 process4 dnsIp5 69 www.ftchat.com 8->69 71 kavram.com 8->71 77 174 other IPs or domains 8->77 45 C:\Users\user\pigalicapi.exe, PE32 8->45 dropped 47 C:\Users\...\pigalicapi.exe:Zone.Identifier, ASCII 8->47 dropped 119 Contains functionality to inject threads in other processes 8->119 121 Drops PE files to the user root directory 8->121 123 Contains functionality to inject code into remote processes 8->123 125 Contains functionality to compare user and computer (likely to detect sandboxes) 8->125 17 svchost.exe 8->17         started        73 www.jacomfg.com 13->73 79 163 other IPs or domains 13->79 127 Multi AV Scanner detection for dropped file 13->127 129 Writes to foreign memory regions 13->129 131 Allocates memory in foreign processes 13->131 21 svchost.exe 13->21         started        75 uhsa.edu.ag 15->75 81 154 other IPs or domains 15->81 133 Injects a PE file into a foreign processes 15->133 23 svchost.exe 15->23         started        file6 135 System process connects to network (likely due to code injection or exploit) 75->135 signatures7 process8 dnsIp9 49 mail.airmail.net 66.226.70.66 INFB2-ASUS United States 17->49 57 3 other IPs or domains 17->57 25 svchost.exe 12 17->25         started        29 svchost.exe 17->29         started        31 svchost.exe 17->31         started        33 svchost.exe 17->33         started        51 smtp1.sbc.mail.am0.yahoodns.net 21->51 59 6 other IPs or domains 21->59 101 System process connects to network (likely due to code injection or exploit) 21->101 103 Contains functionality to inject threads in other processes 21->103 105 Injects a PE file into a foreign processes 21->105 43 4 other processes 21->43 53 yasuma.com 23->53 55 smtp1.sbc.mail.am0.yahoodns.net 23->55 61 2 other IPs or domains 23->61 35 svchost.exe 23->35         started        37 svchost.exe 23->37         started        39 svchost.exe 23->39         started        41 svchost.exe 23->41         started        signatures10 process11 dnsIp12 83 62 other IPs or domains 25->83 137 System process connects to network (likely due to code injection or exploit) 25->137 85 120 other IPs or domains 29->85 87 73 other IPs or domains 31->87 89 150 other IPs or domains 33->89 91 76 other IPs or domains 35->91 93 27 other IPs or domains 37->93 95 22 other IPs or domains 39->95 97 62 other IPs or domains 41->97 99 112 other IPs or domains 43->99 signatures13
Threat name:
Win32.Trojan.Cutwail
Status:
Malicious
First seen:
2023-03-09 14:22:08 UTC
File Type:
PE (Exe)
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
persistence upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
UPX packed file
Unpacked files
SH256 hash:
f812cff25ac78391ad0621231aa8556d459a3cea3205a04b097744f1e0116a60
MD5 hash:
ab0fa68fdf4a67b3a404250f073e15ba
SHA1 hash:
7eb499acfbe7a3d4d536ab2de8e95be4d7234bbf
SH256 hash:
0e9318472d0806d10f386d74a5c65648040de870241dd77d5c17639befe26c44
MD5 hash:
8c37378de4f2760cf343136e9e9bddf7
SHA1 hash:
76e1411fa88817577a3389b0da3751686b704bd4
Detections:
win_pushdo_auto
SH256 hash:
6618359d4d19997728359453b0598be7562c293ef9d6ac51f2635586096a52bd
MD5 hash:
3e7a4148f1133cb4b8a097fd74590f44
SHA1 hash:
fec43c982b497f4ddbb8c35245c295355676a07a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Cutwail

Executable exe 6618359d4d19997728359453b0598be7562c293ef9d6ac51f2635586096a52bd

(this sample)

  
Delivery method
Distributed via web download

Comments