MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6618359d4d19997728359453b0598be7562c293ef9d6ac51f2635586096a52bd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Cutwail
Vendor detections: 14
| SHA256 hash: | 6618359d4d19997728359453b0598be7562c293ef9d6ac51f2635586096a52bd |
|---|---|
| SHA3-384 hash: | 6526d965bd8e30c18f677131b03dd9d9e068d23a4f1e363bac8a5834a6ee1f5cdaf77bd1436cd1a57ab923e4074fd975 |
| SHA1 hash: | fec43c982b497f4ddbb8c35245c295355676a07a |
| MD5 hash: | 3e7a4148f1133cb4b8a097fd74590f44 |
| humanhash: | juliet-hotel-salami-solar |
| File name: | 3e7a4148f1133cb4b8a097fd74590f44.exe |
| Download: | download sample |
| Signature | Cutwail |
| File size: | 153'884 bytes |
| First seen: | 2023-03-10 06:53:01 UTC |
| Last seen: | 2023-03-10 08:31:05 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 6e4f30e5ff96a025a586abf0edae33b8 (1 x Cutwail) |
| ssdeep | 1536:nHcXFmx32TcZ8BCNDoeRHRQEQcUgaZutJ3gZNGxFh+Lx5s+5DFB+Er/qObMg8:H7gcNDnxQEdUStJ3gyxX+LU6iEr/qOK |
| Threatray | 14 similar samples on MalwareBazaar |
| TLSH | T18BE34BD6BFC91D8BE725423EDCEAD352623EF6F50A821F13242949771B325952EC0287 |
| TrID | 32.2% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 20.5% (.EXE) Win64 Executable (generic) (10523/12/4) 12.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 9.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 8.7% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | Cutwail exe |
Intelligence
File Origin
# of uploads :
2
# of downloads :
223
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
3e7a4148f1133cb4b8a097fd74590f44.exe
Verdict:
Malicious activity
Analysis date:
2023-03-10 06:58:30 UTC
Tags:
opendir
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Сreating synchronization primitives
Creating a file
Enabling the 'hidden' option for recently created files
DNS request
Sending an HTTP POST request
Launching a process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Sending an HTTP POST request to an infection source
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
6/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
CheckCmdLine
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
anti-debug anti-vm cutwail emotet overlay packed spyeye
Verdict:
Malicious
Labled as:
Win/malicious_confidence_90%
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Cutwail
Verdict:
Malicious
Result
Threat name:
Pushdo
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Send many emails (e-Mail Spam)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to resolve many domain names, but no domain seems valid
Writes to foreign memory regions
Yara detected Backdoor Pushdo
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Cutwail
Status:
Malicious
First seen:
2023-03-09 14:22:08 UTC
File Type:
PE (Exe)
AV detection:
15 of 24 (62.50%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 4 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
7/10
Tags:
persistence upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
UPX packed file
Unpacked files
SH256 hash:
fdc68ffd0e5cb3f319eddf083c7e5774ed74a4f86acf212e35ff0dc4f4e91a3c
MD5 hash:
8b3b037e6ba76e4aae95355902278a63
SHA1 hash:
ae607d9392f93b035363f57b90719f058cd69a0a
Detections:
win_pushdo_auto
Parent samples :
b392f2d4ca451b9b125219b6b4f17d491b76e5dc464cfe47f4963ba356db961f
c0183ded48b43c6bebca6093caf1d8d5a85f7c651aeb6caf86e55819d14238ba
b1a705cc5dadd4aece01bedec08657b96398d09e610d99cd14f0896825d70d09
6618359d4d19997728359453b0598be7562c293ef9d6ac51f2635586096a52bd
987204ca82337f0a3f28097a5d66d5f3ecb11d43d82f67cd753d0bf2ce40b7a7
f8ef3e3b18e72eebb4b18edbc90f7f5851ab0af044473fa2856fc974f0c33d6c
7c2906c9277e39c2d1be87adbd342e6faba7b0aa593233663d0007cb4119ccc6
c0183ded48b43c6bebca6093caf1d8d5a85f7c651aeb6caf86e55819d14238ba
b1a705cc5dadd4aece01bedec08657b96398d09e610d99cd14f0896825d70d09
6618359d4d19997728359453b0598be7562c293ef9d6ac51f2635586096a52bd
987204ca82337f0a3f28097a5d66d5f3ecb11d43d82f67cd753d0bf2ce40b7a7
f8ef3e3b18e72eebb4b18edbc90f7f5851ab0af044473fa2856fc974f0c33d6c
7c2906c9277e39c2d1be87adbd342e6faba7b0aa593233663d0007cb4119ccc6
SH256 hash:
f812cff25ac78391ad0621231aa8556d459a3cea3205a04b097744f1e0116a60
MD5 hash:
ab0fa68fdf4a67b3a404250f073e15ba
SHA1 hash:
7eb499acfbe7a3d4d536ab2de8e95be4d7234bbf
SH256 hash:
0e9318472d0806d10f386d74a5c65648040de870241dd77d5c17639befe26c44
MD5 hash:
8c37378de4f2760cf343136e9e9bddf7
SHA1 hash:
76e1411fa88817577a3389b0da3751686b704bd4
Detections:
win_pushdo_auto
SH256 hash:
6618359d4d19997728359453b0598be7562c293ef9d6ac51f2635586096a52bd
MD5 hash:
3e7a4148f1133cb4b8a097fd74590f44
SHA1 hash:
fec43c982b497f4ddbb8c35245c295355676a07a
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Cutwail
Score:
0.90
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.