MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 66cebd1b0a87df2ddcd805723d15e8094c23dfe1d4a2108348579995a102c994. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Pitou


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments 1

SHA256 hash: 66cebd1b0a87df2ddcd805723d15e8094c23dfe1d4a2108348579995a102c994
SHA3-384 hash: d5eeef3517811d7222e76e06127184b9502d2efb7ed36b520f9fa442ae58a5fdd422a5f652064b65b9358445d2cf05d6
SHA1 hash: f35896ae3509d26794ea207c93a5ae2725ac1c53
MD5 hash: 99a8becf9560cb3584930f0cdea99ecb
humanhash: kilo-robert-purple-victor
File name:99a8becf9560cb3584930f0cdea99ecb
Download: download sample
Signature Pitou
File size:698'880 bytes
First seen:2021-08-10 11:01:42 UTC
Last seen:2021-08-10 11:43:14 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash cc4caabe2c1a9c923331965c9764375d (3 x Pitou, 2 x RedLineStealer, 2 x GCleaner)
ssdeep 12288:5btUdicYVsqb/c7dJQx5BZtbZcUQ7URtFF3yZfBgAXaqxST:LolYVj59bZcRgtj3yZ5gAKqET
Threatray 13 similar samples on MalwareBazaar
TLSH T1C9E4E130B660C034F9B711F845B6C3BDA92D7B729B3450CB92E41AEA57386E8AD31747
dhash icon 60e8e8e8aa66a499 (24 x RaccoonStealer, 14 x RedLineStealer, 7 x Smoke Loader)
Reporter zbetcheckin
Tags:32 exe Pitou

Intelligence


File Origin
# of uploads :
2
# of downloads :
892
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
99a8becf9560cb3584930f0cdea99ecb
Verdict:
Malicious activity
Analysis date:
2021-08-10 11:05:09 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Blocking the Windows Defender launch
Rewriting of the hard drive's master boot record
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
72 / 100
Signature
Contains functionality to infect the boot sector
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Injuke
Status:
Malicious
First seen:
2021-08-10 11:02:05 UTC
AV detection:
15 of 28 (53.57%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
bootkit persistence
Behaviour
Suspicious use of AdjustPrivilegeToken
Writes to the Master Boot Record (MBR)
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Pitou

Executable exe 66cebd1b0a87df2ddcd805723d15e8094c23dfe1d4a2108348579995a102c994

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-08-10 11:01:44 UTC

url : hxxp://37.120.239.108/200.exe