MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6d709ab6cce6661ebf8fc4002246819cb68d17267e029d89c82b19a0813690dc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 6d709ab6cce6661ebf8fc4002246819cb68d17267e029d89c82b19a0813690dc
SHA3-384 hash: adf8de708b274a06032cbe6bb21bffdc4bc6e5b8ff095f227ba25b9ea15203ee049ea83b1f5a32766a244e014398d7a2
SHA1 hash: da450a85100e197a6e761a5e901034adb9415b37
MD5 hash: fdab876bf6bd69a187548abd9d26ed0a
humanhash: india-mississippi-illinois-october
File name:Order inquiry.09221.exe
Download: download sample
File size:566'784 bytes
First seen:2020-10-15 10:35:54 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'751 x AgentTesla, 19'657 x Formbook, 12'248 x SnakeKeylogger)
ssdeep 12288:WM/Rwr6Pv6d7OvNq/E0jnc4EXFWsC6cNHVb:1xv68vs8wNEVW3lt
Threatray 30 similar samples on MalwareBazaar
TLSH 46C4ACF84EB05EABEEB81975A00221334EF8DEC22555F6843ED42CD571ECB4B43946A7
Reporter abuse_ch
Tags:exe


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: merchantshpg.com
Sending IP: 193.56.28.204
From: Ajay Hodar<ajay.hodar@merchantshpg.com>
Subject: Inquiry for excavator
Attachment: Order inquiry.09221.zip (contains "Order inquiry.09221.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
73
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Launching the default Windows debugger (dwwin.exe)
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
64 / 100
Signature
Antivirus / Scanner detection for submitted sample
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-10-14 10:37:45 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Unpacked files
SH256 hash:
6d709ab6cce6661ebf8fc4002246819cb68d17267e029d89c82b19a0813690dc
MD5 hash:
fdab876bf6bd69a187548abd9d26ed0a
SHA1 hash:
da450a85100e197a6e761a5e901034adb9415b37
SH256 hash:
01dd844990e0c5fdcea0f88712253aa1ef4750316f0734ab7099306170b5ea2a
MD5 hash:
eb593633270aa19162cf64663df9dd6c
SHA1 hash:
2ec57181471ff10abe9a04239ca3ea86ea4252b9
SH256 hash:
00478b4a2a5c70f4f83a5f023546cf1c282305d8ae85863254dfde0466e89e6b
MD5 hash:
4ac32fb688158ecdc8074977affb9733
SHA1 hash:
e60ad3ea101230df5a322d3224c0297f8b535201
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe 6d709ab6cce6661ebf8fc4002246819cb68d17267e029d89c82b19a0813690dc

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments