MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6a4ebf513f996bd7198c711bef936a989fea148c235817ea56c1e2afafa927f5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Hive
Vendor detections: 9
| SHA256 hash: | 6a4ebf513f996bd7198c711bef936a989fea148c235817ea56c1e2afafa927f5 |
|---|---|
| SHA3-384 hash: | 1437b3b2a7d85c52afa470460fd7edae343c4133f98462fe85f0eb221d0810c42b3833f73517f9b2e9d0a01c8dd86db9 |
| SHA1 hash: | 8b0bb834b082d7ffc1d730031a964fe50bf6d514 |
| MD5 hash: | 276762ea80c28871d3a6997043c3016c |
| humanhash: | spaghetti-kilo-johnny-autumn |
| File name: | 6a4ebf513f996bd7198c711bef936a989fea148c235817ea56c1e2afafa927f5.bin |
| Download: | download sample |
| Signature | Hive |
| File size: | 433'664 bytes |
| First seen: | 2022-03-28 23:15:16 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | a9d048605f07f7f9f42b35afedade3f7 (2 x Hive) |
| ssdeep | 6144:zuzIkI/bkS1+0EdYi+91xzrM68PS5OWGM/gRDfr33S8SQx6:zuzI5/bX+0EdYfHzmSgC8Sy |
| Threatray | 10 similar samples on MalwareBazaar |
| TLSH | T13F943A43F6A250ACC06AC0788357A633F9727C0D46357AAB6BE0FE312F65B50A72D715 |
| Reporter | |
| Tags: | exe Hive Ransomware |
Intelligence
File Origin
# of uploads :
1
# of downloads :
434
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
6a4ebf513f996bd7198c711bef936a989fea148c235817ea56c1e2afafa927f5.exe
Verdict:
No threats detected
Analysis date:
2022-03-29 00:39:45 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Clean
Maliciousness:
Behaviour
Searching for the window
Result
Malware family:
n/a
Score:
8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
anti-debug expand.exe filecoder ransomware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Suspicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win64.Ransomware.Hive
Status:
Malicious
First seen:
2022-03-20 02:23:00 UTC
File Type:
PE+ (Exe)
AV detection:
20 of 26 (76.92%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
Unpacked files
SH256 hash:
6a4ebf513f996bd7198c711bef936a989fea148c235817ea56c1e2afafa927f5
MD5 hash:
276762ea80c28871d3a6997043c3016c
SHA1 hash:
8b0bb834b082d7ffc1d730031a964fe50bf6d514
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.