MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6c5a9d44fbd77d8e217c2017d99dbc3c67cd27251a692bdfe9bc6caf6be1bbe1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Jadtre


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 6c5a9d44fbd77d8e217c2017d99dbc3c67cd27251a692bdfe9bc6caf6be1bbe1
SHA3-384 hash: ab3d7c6f6683957ec37031955c9cf78d9cf03356e1bdbef3b5ed52b6d3687a46a727819890d243b30a5a17939da6315b
SHA1 hash: 82fca9463abc47a9885cfde7711e42b548384b3d
MD5 hash: fb22fffa9cec1e804f12cf380d8cf2e4
humanhash: december-pennsylvania-dakota-fish
File name:afc5616a791a9b2f7ddcdaad46994dcb
Download: download sample
Signature Jadtre
File size:27'136 bytes
First seen:2020-11-17 15:59:54 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 87bed5a7cba00c7e1f4015f1bdae2183 (3'034 x Jadtre, 23 x IcedID, 17 x Blackmoon)
ssdeep 768:Ed5u7mNGtyVfhvqQGPL4vzZq2oZ7GJxFsy:Ed5z/fhBGCq2w74
Threatray 1'575 similar samples on MalwareBazaar
TLSH 08C2D0B2CE8080FFC0CF3072204511CB9B175A72557A68A7A750981E7DBCDD0DA7A757
Reporter seifreed

Intelligence


File Origin
# of uploads :
1
# of downloads :
65
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Sending a UDP request
Creating a process from a recently created file
Creating a window
Changing an executable file
DNS request
Connection attempt
Sending an HTTP POST request
Modifying an executable file
Creating a file
Running batch commands
Creating a process with a hidden window
Connection attempt to an infection source
Infecting executable files
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
spre.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Wapomi
Behaviour
Behavior Graph:
Threat name:
Win32.Virus.Jadtre
Status:
Malicious
First seen:
2020-11-17 16:07:50 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Unpacked files
SH256 hash:
6c5a9d44fbd77d8e217c2017d99dbc3c67cd27251a692bdfe9bc6caf6be1bbe1
MD5 hash:
fb22fffa9cec1e804f12cf380d8cf2e4
SHA1 hash:
82fca9463abc47a9885cfde7711e42b548384b3d
SH256 hash:
5a720102742ae696d8c395bc7885bc79addb08ff67cf75a14aa5a0db26c85026
MD5 hash:
58fdd26f096d31311b4cf0447f0ceb7b
SHA1 hash:
201e08fade694b12e980b0df8cb6dc63449d7ff1
Detections:
win_unidentified_045_g0 win_unidentified_045_auto
SH256 hash:
ef844ff6e3b5b8a7ec43774c408d52e1fcbf8d85a7d4f1cf6a03f530c68049f8
MD5 hash:
d03365c59970bc9e4ced8bda362fd5c7
SHA1 hash:
07318d3a3656ddff6c39fed1a728ec9ffa3a7c63
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments