MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 66af4bca3df1ee98ec1fdb65b4e5fed4146bd0743ef8318c87368434d3ac50de. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 66af4bca3df1ee98ec1fdb65b4e5fed4146bd0743ef8318c87368434d3ac50de
SHA3-384 hash: 8dccd9bdae0f70e7485a7b79439fe667e13e125694252ff713c7e741cccc42fd33d63a7cb4fd8028fb87e64bfdeea0e5
SHA1 hash: bea77cbd4fb58a6e97a994310b63f7c3c2761cbe
MD5 hash: 4e9c546a54e40d0da89bb4616dd7f8c4
humanhash: west-early-nuts-virginia
File name:Print-Preview-Report.exe
Download: download sample
File size:580'056 bytes
First seen:2021-01-29 18:36:54 UTC
Last seen:2021-01-29 19:29:21 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1203cc004441962ade89df9ac02e1de8
ssdeep 6144:I/KIsyHfiS4P1m2v21qohpidyd/zWZ4hiN2pIE7tBOfkgdhH+BP+8db3b6qdvkKl:IyI4Z1mNoodzcNUIoOfbUd+8xb6AvZ
Threatray 2 similar samples on MalwareBazaar
TLSH 28C4AD45B25500F9EF66813C8851944EE262BC1E0B23DAABC7607F5A3F372D05EFA725
Reporter James_inthe_box
Tags:exe

Code Signing Certificate

Organisation:Certum Extended Validation Code Signing CA SHA2
Issuer:Certum Trusted Network CA
Algorithm:sha256WithRSAEncryption
Valid from:Oct 29 11:55:39 2015 GMT
Valid to:Jan 19 11:55:39 2027 GMT
Serial number: 4E96C1BA06258A0C2ABA27625E9064D3
Intelligence: 23 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 176AAE8BDD5DD06A7DBD42862DC173BD838FFE3013103B097B9671C37BA6AE14
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
159
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://bit.ly/39tVqoQ
Verdict:
Malicious activity
Analysis date:
2021-01-29 18:26:28 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Changing a file
Launching the default Windows debugger (dwwin.exe)
DNS request
Sending a UDP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
64 / 100
Signature
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Sample uses process hollowing technique
Sets debug register (to hijack the execution of another thread)
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Bazarldr
Status:
Malicious
First seen:
2021-01-29 18:36:35 UTC
File Type:
PE+ (Exe)
Extracted files:
3
AV detection:
12 of 46 (26.09%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Blocklisted process makes network request
Unpacked files
SH256 hash:
66af4bca3df1ee98ec1fdb65b4e5fed4146bd0743ef8318c87368434d3ac50de
MD5 hash:
4e9c546a54e40d0da89bb4616dd7f8c4
SHA1 hash:
bea77cbd4fb58a6e97a994310b63f7c3c2761cbe
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments