MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 695141d7a2ad5ab74c3b10a5a70d5d9d279876cfa58e0a19bbfd0ca9b61fc005. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 14 File information Comments

SHA256 hash: 695141d7a2ad5ab74c3b10a5a70d5d9d279876cfa58e0a19bbfd0ca9b61fc005
SHA3-384 hash: 8c310e88851eeea3fb011a189982bf71b04d39286ecd1f0615d6027eeb2c0f4e52e979981d02748552ae6c97a92f6d23
SHA1 hash: 16f32a49e99222125bf5ab0e9051d60fb731e9dd
MD5 hash: 616007447ba71fa737a5c37fe3dccd26
humanhash: four-oscar-emma-mobile
File name:695141d7a2ad5ab74c3b10a5a70d5d9d279876cfa58e0a19bbfd0ca9b61fc005
Download: download sample
File size:18'067'916 bytes
First seen:2025-01-16 10:48:01 UTC
Last seen:2025-04-09 13:12:48 UTC
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 393216:E1Mlxgd2KyqEOj4P8Mi4aToiWlfUOCZlFfpliJw2H961Jsv6tWKFdu9CJ4ZdXo:ESe2vwElfb+NXiJD9tq
Threatray 6 similar samples on MalwareBazaar
TLSH T1C807E16372C2403AD1AF21759F1AB36495FDFD3146315A977AEC3D082B35A82A72B313
TrID 80.0% (.MSI) Microsoft Windows Installer (454500/1/170)
10.7% (.MST) Windows SDK Setup Transform script (61000/1/5)
7.8% (.MSP) Windows Installer Patch (44509/10/5)
1.4% (.) Generic OLE2 / Multistream Compound (8000/1)
Magika msi
Reporter Anonymous
Tags:msi

Intelligence


File Origin
# of uploads :
2
# of downloads :
80
Origin country :
FR FR
Vendor Threat Intelligence
Verdict:
Malicious
Score:
98.2%
Tags:
shellcode vmdetect dropper smtp
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-vm anti-vm crypto datper evasive explorer fingerprint fingerprint infostealer keylogger lolbin remote
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.evad
Score:
96 / 100
Signature
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1592656 Sample: CLOlOswCpi.msi Startdate: 16/01/2025 Architecture: WINDOWS Score: 96 98 radikalitiko.online 2->98 100 fg.microsoft.map.fastly.net 2->100 120 Multi AV Scanner detection for dropped file 2->120 122 Multi AV Scanner detection for submitted file 2->122 124 PE file has a writeable .text section 2->124 126 AI detected suspicious sample 2->126 13 msiexec.exe 2->13         started        15 iScrPaint.exe 1 2->15         started        18 msedge.exe 2->18         started        21 2 other processes 2->21 signatures3 process4 dnsIp5 24 msiexec.exe 54 13->24         started        150 Maps a DLL or memory area into another process 15->150 152 Found direct / indirect Syscall (likely to bypass EDR) 15->152 27 cmd.exe 15->27         started        102 192.168.2.4, 138, 443, 49264 unknown unknown 18->102 104 239.255.255.250 unknown Reserved 18->104 30 msedge.exe 18->30         started        33 msedge.exe 18->33         started        35 msedge.exe 18->35         started        39 3 other processes 18->39 74 C:\Users\user\AppData\Local\...\MSI630A.tmp, PE32 21->74 dropped 76 C:\Users\user\AppData\Local\...\MSI5EB4.tmp, PE32 21->76 dropped 37 msedge.exe 21->37         started        file6 signatures7 process8 dnsIp9 78 C:\Users\user\AppData\...\_isres_0x0409.dll, PE32 24->78 dropped 80 C:\Users\user\AppData\Local\Temp\...\ISRT.dll, PE32 24->80 dropped 82 C:\Users\user\AppData\Local\...\ISBEW64.exe, PE32+ 24->82 dropped 86 2 other malicious files 24->86 dropped 41 iScrPaint.exe 5 24->41         started        45 msedge.exe 24->45         started        47 ISBEW64.exe 24->47         started        53 9 other processes 24->53 84 C:\Users\user\AppData\Local\Temp\jjvrwhcts, PE32+ 27->84 dropped 138 Writes to foreign memory regions 27->138 140 Maps a DLL or memory area into another process 27->140 49 MakeBeaconSX.exe 27->49         started        51 conhost.exe 27->51         started        106 20.110.205.119, 443, 49870, 49921 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 30->106 108 20.189.173.6, 443, 49916, 49953 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 30->108 110 13 other IPs or domains 30->110 file10 signatures11 process12 file13 88 C:\Users\user\AppData\...\iScrPaint.exe, PE32 41->88 dropped 90 C:\Users\user\AppData\Roaming\...\WebUI.dll, PE32 41->90 dropped 134 Switches to a custom stack to bypass stack traces 41->134 136 Found direct / indirect Syscall (likely to bypass EDR) 41->136 55 iScrPaint.exe 1 41->55         started        58 msedge.exe 45->58         started        signatures14 process15 signatures16 128 Maps a DLL or memory area into another process 55->128 130 Switches to a custom stack to bypass stack traces 55->130 132 Found direct / indirect Syscall (likely to bypass EDR) 55->132 60 cmd.exe 5 55->60         started        process17 file18 92 C:\Users\user\AppData\...\MakeBeaconSX.exe, PE32+ 60->92 dropped 94 C:\Users\user\AppData\Local\Temp\oiypayg, PE32+ 60->94 dropped 142 Writes to foreign memory regions 60->142 144 Found hidden mapped module (file has been removed from disk) 60->144 146 Maps a DLL or memory area into another process 60->146 148 Switches to a custom stack to bypass stack traces 60->148 64 MakeBeaconSX.exe 60->64         started        68 conhost.exe 60->68         started        signatures19 process20 dnsIp21 96 radikalitiko.online 104.21.85.2, 443, 49739, 49740 CLOUDFLARENETUS United States 64->96 112 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 64->112 114 Tries to harvest and steal browser information (history, passwords, etc) 64->114 116 Tries to harvest and steal Bitcoin Wallet information 64->116 118 Found direct / indirect Syscall (likely to bypass EDR) 64->118 70 msedge.exe 64->70         started        signatures22 process23 process24 72 msedge.exe 70->72         started       
Threat name:
Win32.Trojan.Rugmi
Status:
Malicious
First seen:
2025-01-13 06:47:57 UTC
File Type:
Binary (Archive)
Extracted files:
44
AV detection:
10 of 38 (26.32%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
collection discovery persistence privilege_escalation spyware stealer
Behaviour
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
outlook_office_path
Browser Information Discovery
Enumerates physical storage devices
Event Triggered Execution: Installer Packages
Reads user/profile data of web browsers
System Location Discovery: System Language Discovery
Executes dropped EXE
Loads dropped DLL
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Enumerates connected drives
Reads WinSCP keys stored on the system
Verdict:
Malicious
Tags:
backdoor datper apt
YARA:
Datper tick_Datper
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:Borland
Author:malware-lu
Rule name:Datper
Author:JPCERT/CC Incident Response Group
Description:detect Datper in memory
Reference:https://blogs.jpcert.or.jp/en/2017/08/detecting-datper-malware-from-proxy-logs.html
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:test_Malaysia
Author:rectifyq
Description:Detects file containing malaysia string
Rule name:tick_Datper
Author:JPCERT/CC Incident Response Group
Description:detect Datper in memory
Reference:https://blogs.jpcert.or.jp/en/2017/08/detecting-datper-malware-from-proxy-logs.html
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:with_urls
Author:Antonio Sanchez <asanchez@hispasec.com>
Description:Rule to detect the presence of an or several urls
Reference:http://laboratorio.blogs.hispasec.com/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments