MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 69b221182986dbb6fcbe6730c105ab8e0380315713e3459155c1ea1cbba5de42. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 4 File information Comments

SHA256 hash: 69b221182986dbb6fcbe6730c105ab8e0380315713e3459155c1ea1cbba5de42
SHA3-384 hash: 6cb7f3a8b6cb9979ee4185512c53852d7ed2c1abfa7d624f98d0d692a7284f0aeae21135ebfe554eff03ff6945399f1d
SHA1 hash: 18365ec0092d4a52d51edf56a5b773efa33113c4
MD5 hash: 6531319335bf4898b9f2e5f2da4fda36
humanhash: cardinal-white-september-timing
File name:SecuriteInfo.com.FileRepMalware.795.18532
Download: download sample
File size:2'187'167 bytes
First seen:2023-10-19 05:40:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 90dd8f7b35d8e4a26403d116e20082b8
ssdeep 49152:26s4sH3M3rwYftw2U4aDBq1ZUxYL76u3mn6ZcpXguWUmNBtQ/5l6:7svc3MYez9DBq1ZZL7q6apX5mNBtMQ
Threatray 108 similar samples on MalwareBazaar
TLSH T1A7A533097E1CB5C8D73C0932CDA3CBB71854ED9E97CA14EDA7E833462472B52AD0966C
TrID 29.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
22.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
20.3% (.EXE) Win32 Executable (generic) (4505/5/1)
9.1% (.EXE) OS/2 Executable (generic) (2029/13)
9.0% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon d299bcb8c6d6d060
Reporter SecuriteInfoCom
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
317
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.FileRepMalware.795.18532
Verdict:
Malicious activity
Analysis date:
2023-10-19 08:21:03 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
DNS request
Sending an HTTP GET request
Searching for the browser window
Launching a process
Creating a file
Launching the default Windows debugger (dwwin.exe)
Sending an HTTP POST request
Sending a custom TCP request
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
flystudio hupigon lolbin nspack packed packed packed shell32 threat virus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
64 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1328478 Sample: SecuriteInfo.com.FileRepMal... Startdate: 19/10/2023 Architecture: WINDOWS Score: 64 26 www.loo77.com 2->26 28 ww25.loo77.com 2->28 30 2 other IPs or domains 2->30 48 Multi AV Scanner detection for domain / URL 2->48 50 Multi AV Scanner detection for submitted file 2->50 52 Machine Learning detection for sample 2->52 8 SecuriteInfo.com.FileRepMalware.795.18532.exe 1 15 2->8         started        signatures3 process4 dnsIp5 38 www.loo77.com 103.224.212.214, 443, 49706, 49709 TRELLIAN-AS-APTrellianPtyLimitedAU Australia 8->38 40 77026.bodis.com 199.59.243.225, 443, 49707, 49716 BODIS-NJUS United States 8->40 54 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 8->54 12 chrome.exe 9 8->12         started        15 WerFault.exe 22 16 8->15         started        17 WerFault.exe 2 16 8->17         started        signatures6 process7 dnsIp8 42 192.168.2.11, 138, 3478, 443 unknown unknown 12->42 44 192.168.2.30 unknown unknown 12->44 46 239.255.255.250 unknown Reserved 12->46 19 chrome.exe 12->19         started        22 chrome.exe 12->22         started        24 chrome.exe 6 12->24         started        process9 dnsIp10 32 delivery.consentmanager.net 87.230.98.74, 443, 49748, 49752 PLUSSERVER-ASN1DE Germany 19->32 34 www3.l.google.com 142.251.2.100, 443, 49736 GOOGLEUS United States 19->34 36 18 other IPs or domains 19->36
Result
Malware family:
n/a
Score:
  7/10
Tags:
upx
Behaviour
Enumerates system info in registry
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
UPX packed file
Unpacked files
SH256 hash:
69b221182986dbb6fcbe6730c105ab8e0380315713e3459155c1ea1cbba5de42
MD5 hash:
6531319335bf4898b9f2e5f2da4fda36
SHA1 hash:
18365ec0092d4a52d51edf56a5b773efa33113c4
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:NsPack29NorthStar
Author:malware-lu
Rule name:nSpackV2xLiuXingPing
Author:malware-lu

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments