MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6c5e170ec02d30c57a8bbceb8533eb73efd7b46f8ae1cd6e552fa6a5656afb36. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loda


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 6c5e170ec02d30c57a8bbceb8533eb73efd7b46f8ae1cd6e552fa6a5656afb36
SHA3-384 hash: c0d27ae5ec40f45faa31f2611cda3b27a79fe53074c61451acabf6f7538e01ce16b216c4440678855c315e69a3a7f6e2
SHA1 hash: f05af9477a0e87e53fa870537ebe9d061aeb7831
MD5 hash: 8df974cd82ec27ce7638acccc66fd3a5
humanhash: diet-mexico-comet-robin
File name:final Order.exe
Download: download sample
Signature Loda
File size:1'187'883 bytes
First seen:2020-08-17 06:09:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d3bf8a7746a8d1ee8f6e5960c3f69378 (247 x Formbook, 75 x AgentTesla, 64 x SnakeKeylogger)
ssdeep 24576:0RmJkcoQricOIQxiZY1iaaDUvJTyx8lYAv5Ed5pNorrOqMT:RJZoQrbTFZY1iaaDUv88l5v5EdvLq2
Threatray 169 similar samples on MalwareBazaar
TLSH CA45E122F5D68036C2B323B19E7EF76A963D65360337D19B27C82D315EA04816B39763
Reporter abuse_ch
Tags:exe Loda


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: mailfilter02.viettel.com.vn
Sending IP: 125.235.240.54
From: htethtet.win@vcm.com.mm
Subject: Request for quotation (Very Urgent)
Attachment: final Order.REV (contains "final Order.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
89
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% subdirectories
Using the Windows Management Instrumentation requests
Creating a file in the %temp% directory
Creating a process from a recently created file
Sending a UDP request
Connection attempt
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
evad
Score:
35 / 100
Signature
a
c
d
e
f
h
I
l
m
n
o
p
s
t
u
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 268548 Sample: final Order.exe Startdate: 17/08/2020 Architecture: WINDOWS Score: 35 22 Initial sample is a PE file and has a suspicious name 2->22 6 final Order.exe 2 4 2->6         started        10 AXHOGH.exe 2->10         started        12 AXHOGH.exe 2->12         started        14 AXHOGH.exe 2->14         started        process3 dnsIp4 20 46.243.136.238, 4000 ETOP-ASPL Netherlands 6->20 18 C:\Users\user\AppData\Roaming\...\AXHOGH.exe, PE32 6->18 dropped 16 wscript.exe 6->16         started        file5 process6
Threat name:
Win32.Trojan.Nymeria
Status:
Malicious
First seen:
2020-08-17 06:11:09 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Adds Run key to start application
Adds Run key to start application
Drops startup file
Drops startup file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loda

Executable exe 6c5e170ec02d30c57a8bbceb8533eb73efd7b46f8ae1cd6e552fa6a5656afb36

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments