MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6958cc20b390a826778c286a41e3601cbae129d26d4bd2e50b350ba2c336aa5f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 6958cc20b390a826778c286a41e3601cbae129d26d4bd2e50b350ba2c336aa5f
SHA3-384 hash: d8095304da820503e41138af2f6a4f38f188caafae86acb6e953fe27654fdcdfdd9316305d1e3ab05c9450ff4fc02378
SHA1 hash: 7bb2dc418d5099b666df586e056cd5f53287c1e6
MD5 hash: 6192d1233fe0683d14bd980354d8fae9
humanhash: kentucky-island-pluto-nebraska
File name:6192d1233fe0683d14bd980354d8fae9
Download: download sample
File size:271'872 bytes
First seen:2021-06-24 06:46:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2c5f2513605e48f2d8ea5440a870cb9e (60 x Babadeda, 6 x AveMariaRAT, 5 x CoinMiner)
ssdeep 3072:77DhdC6kzWypvaQ0FxyNTBfaeRlaKWh4KaWi8Q/N:7BlkZvaF4NTByeLVWhON
Threatray 59 similar samples on MalwareBazaar
TLSH 6844C5D3E29B8C72D5BD5F7C1176F26066A01D646A30D38E432BFA3283FAAC0511ED56
Reporter zbetcheckin
Tags:32 exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
94
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
6192d1233fe0683d14bd980354d8fae9
Verdict:
No threats detected
Analysis date:
2021-06-24 06:49:27 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Drops batch files with force delete cmd (self deletion)
Uses cmd line tools excessively to alter registry or file data
Behaviour
Behavior Graph:
behaviorgraph top1 process2 2 Behavior Graph ID: 439619 Sample: 7JBvm3kHNh Startdate: 24/06/2021 Architecture: WINDOWS Score: 48 6 7JBvm3kHNh.exe 8 2->6         started        file3 19 C:\Users\user\AppData\Local\Temp\...\6BB6.bat, ASCII 6->19 dropped 21 Drops batch files with force delete cmd (self deletion) 6->21 10 cmd.exe 1 6->10         started        13 conhost.exe 6->13         started        signatures4 process5 signatures6 23 Uses cmd line tools excessively to alter registry or file data 10->23 15 attrib.exe 1 10->15         started        17 attrib.exe 1 10->17         started        process7
Result
Malware family:
n/a
Score:
  8/10
Tags:
evasion
Behaviour
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Sets file to hidden
Unpacked files
SH256 hash:
6958cc20b390a826778c286a41e3601cbae129d26d4bd2e50b350ba2c336aa5f
MD5 hash:
6192d1233fe0683d14bd980354d8fae9
SHA1 hash:
7bb2dc418d5099b666df586e056cd5f53287c1e6
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 6958cc20b390a826778c286a41e3601cbae129d26d4bd2e50b350ba2c336aa5f

(this sample)

  
Delivery method
Distributed via web download

Comments