MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 68c8f03a7cf8d608ffd5f1fb1ee1db70ebd23ff6f409b2636edc5d41a7058624. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 2


Intelligence 2 IOCs YARA File information Comments

SHA256 hash: 68c8f03a7cf8d608ffd5f1fb1ee1db70ebd23ff6f409b2636edc5d41a7058624
SHA3-384 hash: 5618ed1255445f63bdf5001807505eaf1f338ea3920312d9a0e0e192bf9b3f8daf7894bdb08f2aab4f21ca2c74a184f4
SHA1 hash: 7821a80e4ed5879ed1f6fc65dff6222664946c09
MD5 hash: a114690b51f5bbf1ad478a622a41a8e1
humanhash: december-lactose-tennis-pennsylvania
File name:68c8f03a7cf8d608ffd5f1fb1ee1db70ebd23ff6f409b2636edc5d41a7058624
Download: download sample
File size:1'013'970 bytes
First seen:2020-03-30 07:06:00 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e2f2de0565947a20e5170cfa9541da7a
ssdeep 24576:2u43OSYJm2x9NzalyK1BuyK1BuyK1B3lRN1:2hIm2PEBwBwBPj
Threatray 1 similar samples on MalwareBazaar
TLSH EA25F113BA20D456E59583BE90A74339AEB4A3052D74D117FB94ED62BF310619F23B0F
Reporter Marco_Ramilli
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
74
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2014-04-24 02:20:17 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
14 of 31 (45.16%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 68c8f03a7cf8d608ffd5f1fb1ee1db70ebd23ff6f409b2636edc5d41a7058624

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CreateStreamOnHGlobal
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetDriveTypeA
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::SetStdHandle
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileA
KERNEL32.dll::DeleteFileA
KERNEL32.dll::MoveFileA
KERNEL32.dll::GetFileAttributesA
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegOpenKeyA
ADVAPI32.dll::RegQueryValueExA
WIN_USER_APIPerforms GUI ActionsUSER32.dll::AppendMenuA
USER32.dll::CreateMenu
USER32.dll::CreateWindowExA

Comments