MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6bc610ff56266525c3e96ab6f87756235f23295ec421bef974d9e163451d938d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TA505


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 6bc610ff56266525c3e96ab6f87756235f23295ec421bef974d9e163451d938d
SHA3-384 hash: 4244031380efff822ac24f5e5fc0f13f714eb7aaa6873fd8d391a7e839fda825f0e1998db34f425e9d5a6dff350a9c35
SHA1 hash: 9c766d80a232a9aec440f87e5ef1cbae98eb0a1f
MD5 hash: 573e529a3083a7996e09e1b8c5f0999c
humanhash: king-aspen-oven-jersey
File name:str_join1.bin
Download: download sample
Signature TA505
File size:379'304 bytes
First seen:2020-09-03 10:26:48 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 6cadc3c93c0ff520eed14af986367d5d (1 x TA505)
ssdeep 6144:eVfciO14pHHdeSj/fMG09wHRKZtuUZUQk7p86pLic/m7scI3S1Rju:jiO6veSTMPwH+rk71/mQcIC1E
Threatray 4 similar samples on MalwareBazaar
TLSH 8684E026BAC0D2F6D5D7403148515A7D62BE8E637B86B852CF840ADA5C16EC11B2FB23
Reporter JAMESWT_WT
Tags:32bit Corsair Software Solution Inc dll signed TA505

Code Signing Certificate

Organisation:Corsair Software Solution Inc.
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:Aug 5 00:00:00 2020 GMT
Valid to:Aug 5 23:59:59 2021 GMT
Serial number: 51AEAD5A9AB2D841B449FA82DE3A8A00
Intelligence: 4 malware samples on MalwareBazaar are signed with this code signing certificate
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: 155EDD03D034D6958AF61BC6A7181EF8F840FEAE68A236BE3FF73CE7553651B0
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
129
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
A
b
c
d
e
f
i
l
M
n
o
r
S
t
u
V
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 281495 Sample: str_join1.bin Startdate: 03/09/2020 Architecture: WINDOWS Score: 48 14 Multi AV Scanner detection for submitted file 2->14 6 loaddll32.exe 1 2->6         started        process3 process4 8 rundll32.exe 6->8         started        10 rundll32.exe 6->10         started        12 rundll32.exe 6->12         started       
Threat name:
Win32.Trojan.GraceWire
Status:
Malicious
First seen:
2020-09-03 10:28:10 UTC
File Type:
PE (Dll)
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Blacklisted process makes network request
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments