MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 66dfb7c408d734edc2967d50244babae27e4268ea93aa0daa5e6bbace607024c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ParallaxRAT


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments

SHA256 hash: 66dfb7c408d734edc2967d50244babae27e4268ea93aa0daa5e6bbace607024c
SHA3-384 hash: f51c9ddb57656c4f823e0250387143a172e4b85595d4e640975f3b3c41a916bce4a93c653f262d0acd17e83b7953aca2
SHA1 hash: 5d9a604584a5052d5bb7b277be339a1debeaaf59
MD5 hash: c6807985e9ac7a2d65b15728934c0a86
humanhash: social-beer-mango-xray
File name:66dfb7c408d734edc2967d50244babae27e4268ea93aa0daa5e6bbace607024c.bin
Download: download sample
Signature ParallaxRAT
File size:7'248'416 bytes
First seen:2021-07-27 09:13:50 UTC
Last seen:2021-07-27 10:03:23 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5a594319a0d69dbc452e748bcf05892e (21 x ParallaxRAT, 20 x Gh0stRAT, 15 x NetSupport)
ssdeep 98304:dSi+jqKoe10ALnZuIsE5zszaBCpadb95BnMxySiwuF8G5L9zQuxe5UYF/e/Bgmvl:cPLZuU5qCCpm9mNiwuFHJGaW8Bg9CxQC
Threatray 117 similar samples on MalwareBazaar
TLSH T10676223BB254A13EC9AE077246738250597BBA7AE80E8C1E17F4050DCFB65711E3BB16
dhash icon f2909696969ef66e (42 x AgentTesla, 42 x SnakeKeylogger, 13 x Formbook)
Reporter JAMESWT_WT
Tags:51.195.57.229 BedstSammen ApS exe ParallaxRAT signed

Code Signing Certificate

Organisation:BedstSammen ApS
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:2021-05-28T00:00:00Z
Valid to:2022-05-28T23:59:59Z
Serial number: d1737e5a94d2aff121163df177ed7cf7
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: c86eeaf1bbf0d31cb4bfa9efc4d157fe405b02512b1082a91ab3c9a8a8beaa58
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
132
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
TransactionList202307467708.exe.pif
Verdict:
Suspicious activity
Analysis date:
2021-07-26 09:06:38 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Creating a file in the %AppData% directory
Deleting a recently created file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Parallax RAT
Detection:
malicious
Classification:
troj.evad
Score:
75 / 100
Signature
Allocates memory in foreign processes
Hijacks the control flow in another process
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Writes to foreign memory regions
Yara detected Parallax RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 454651 Sample: kaPWB85Egs.bin Startdate: 27/07/2021 Architecture: WINDOWS Score: 75 36 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->36 38 Malicious sample detected (through community Yara rule) 2->38 40 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->40 42 2 other signatures 2->42 9 kaPWB85Egs.exe 2 2->9         started        process3 file4 26 C:\Users\user\AppData\...\kaPWB85Egs.tmp, PE32 9->26 dropped 12 kaPWB85Egs.tmp 3 32 9->12         started        process5 file6 28 C:\Users\user\AppData\...\UtorrentV4.exe, PE32 12->28 dropped 30 C:\Users\user\AppData\Roaming\rtl220.bpl, PE32 12->30 dropped 32 C:\Users\user\AppData\Roaming\cc32220mt.dll, PE32 12->32 dropped 34 17 other files (none is malicious) 12->34 dropped 15 UtorrentV4.exe 1 12->15         started        process7 signatures8 54 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 15->54 56 Hijacks the control flow in another process 15->56 18 notepad.exe 15->18         started        process9 signatures10 44 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 18->44 46 Hijacks the control flow in another process 18->46 48 Writes to foreign memory regions 18->48 50 2 other signatures 18->50 21 cmd.exe 2 18->21         started        24 cmd.exe 18->24         started        process11 signatures12 52 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 21->52
Gathering data
Threat name:
Win32.Trojan.Hesv
Status:
Malicious
First seen:
2021-07-26 08:16:55 UTC
File Type:
PE (Exe)
Extracted files:
1129
AV detection:
8 of 46 (17.39%)
Threat level:
  5/5
Result
Malware family:
parallax
Score:
  10/10
Tags:
family:parallax rat suricata upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Loads dropped DLL
Blocklisted process makes network request
Executes dropped EXE
UPX packed file
ParallaxRat
ParallaxRat payload
suricata: ET MALWARE Parallax CnC Response Activity M14
Unpacked files
SH256 hash:
3f6e45c4072a09e985d764f72b3fed05d4e284f3a0d53b05b691c7de6e02e8eb
MD5 hash:
e7772da490bec982d110aea689c1b927
SHA1 hash:
d6fe58391cfd78d76c793963ab3265138fda7d21
SH256 hash:
fcf5f6ec4de5b314f53e4ad79afa31a8461428459060ac5e17ef132b54a7aa10
MD5 hash:
a1a17d158af58d4a2ff724fdb6231bf1
SHA1 hash:
38345deb7968ca59615c2e9a0677ba2f468d0f72
SH256 hash:
565264775b902828de32a74e6bff4be40941c420a42f5a7b756ec3ef93842f09
MD5 hash:
3bf4a397cfeea2cf9f1879815fc9345f
SHA1 hash:
aba9faf9313c3f919258a051b1c4c8d8939423de
Detections:
win_houdini_auto
SH256 hash:
c4362fe10a8a601e0d6ca0ab2e0d391db168a0217f981c9b40cdf00f3f2977ea
MD5 hash:
2c8d7be968233bf324a008cc4997937d
SHA1 hash:
27a4ae87f9c970764e2cb5ad05193442fd7fa991
SH256 hash:
6eccf15b368bc4c191f61d092c790d4c019029b7b9c980e228243c472c270cc7
MD5 hash:
065d64f67c69765256d356e7cbccf89f
SHA1 hash:
065e23bc44db06532688653c1ae69dd3a9b45eba
SH256 hash:
66dfb7c408d734edc2967d50244babae27e4268ea93aa0daa5e6bbace607024c
MD5 hash:
c6807985e9ac7a2d65b15728934c0a86
SHA1 hash:
5d9a604584a5052d5bb7b277be339a1debeaaf59
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sectigo_Code_Signed
Description:Detects code signed by the Sectigo RSA Code Signing CA
Reference:https://bazaar.abuse.ch/export/csv/cscb/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments