MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6aab235d3e2c5d65a036d081f65a694c60ce9289c20c9bb386dde89bc31099b3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments 1

SHA256 hash: 6aab235d3e2c5d65a036d081f65a694c60ce9289c20c9bb386dde89bc31099b3
SHA3-384 hash: 124dd7d449bec494921e373f85206d4b979f9022bc4e2ff91954dcb2ccb073dd17aa21351dccf769185ccab8222fc7bc
SHA1 hash: f621c9cb44a4400106dd03b14def99b029947c6e
MD5 hash: ee38bbf9ccc6d608ec884c8e92367de4
humanhash: muppet-foxtrot-georgia-speaker
File name:flashplayerpp_install_cn.exe
Download: download sample
File size:1'350'728 bytes
First seen:2021-07-12 08:58:53 UTC
Last seen:2021-07-12 09:59:17 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 10f3801fcfe7b499e82e3ba049338ab0
ssdeep 24576:p0qaTPrNlGmh4mzCledp0Xb20QJphIhFza4/0rBHYyIHZTHK:p0jPr7nOmEEp0Xb2bJ4Fza/rBHYf0
Threatray 19 similar samples on MalwareBazaar
TLSH T15755236AD75CEA12D9C679F4C59B3BCD4BB9BF0D283687F81E826C48F8152431A381C5
Reporter JAMESWT_WT
Tags:BIOPASS exe Legit signed

Code Signing Certificate

Organisation:Adobe Inc.
Issuer:DigiCert EV Code Signing CA (SHA2)
Algorithm:sha256WithRSAEncryption
Valid from:2019-01-31T00:00:00Z
Valid to:2021-02-03T12:00:00Z
Serial number: 0d2caccd3e9eec06738410ba31bf6595
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: ac6728ffef0af0fdaeb6ad1a17400e91b06890358626e1d37989f400da23d82a
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
121
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
6145270430859264.zip
Verdict:
Malicious activity
Analysis date:
2020-12-05 03:43:41 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies Internet Explorer settings
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Program crash
Unpacked files
SH256 hash:
467f6766c0fe82abc9286b530d7fa455360c8c7f20a7f28461c54873e4e4de21
MD5 hash:
6be622c4fd3a217b3f45dcd0b1897ffe
SHA1 hash:
0d31265517b835028a81eaf4e16dd3b60d4bc874
SH256 hash:
94bf4afd3a77d76311159daa2f19643a7f7d1e2c4b37807651b328feeef34668
MD5 hash:
1115be7832a7fa6005cb06aa20cdbb5c
SHA1 hash:
d0cf4dcc15749f031b4f5631bd603daf3bae1696
SH256 hash:
6aab235d3e2c5d65a036d081f65a694c60ce9289c20c9bb386dde89bc31099b3
MD5 hash:
ee38bbf9ccc6d608ec884c8e92367de4
SHA1 hash:
f621c9cb44a4400106dd03b14def99b029947c6e
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
NI@FI@70 commented on 2021-07-14 13:51:24 UTC

not sure if it is Biopass, not on the IoC List https://www.trendmicro.com/en_us/research/21/g/biopass-rat-new-malware-sniffs-victims-via-live-streaming.html