MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6d7b896ce389f5cb0c385bfdfd033fb9a8af53de02bb18cc75c80370a6085148. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



MyDoom


Vendor detections: 17


Intelligence 17 IOCs YARA 3 File information Comments

SHA256 hash: 6d7b896ce389f5cb0c385bfdfd033fb9a8af53de02bb18cc75c80370a6085148
SHA3-384 hash: bf43c22191c5bd394186461079cde52592c3791f187133c806a3a6ddafdf93791a2a02159605a9a29a54fac31262b688
SHA1 hash: d01bbca5df6b16e8d1611d02bdb7231c6f018331
MD5 hash: 521f96dc9c83f2c1ff27b9735968ee27
humanhash: oregon-vegan-uniform-lima
File name:FILE.COM
Download: download sample
Signature MyDoom
File size:22'020 bytes
First seen:2025-02-14 10:25:06 UTC
Last seen:2025-02-14 16:21:28 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5d02f6de12eb07fb22fe87e05e50d6a0 (131 x MyDoom)
ssdeep 384:FZcpzCIqdG3A3WUkx38GZDJuJbf1+o44u8gHzU4Yk+:SCIqdH/k1ZVcT194jp44YD
Threatray 47 similar samples on MalwareBazaar
TLSH T18DA2C09737BBA8C5C15442764963ED70386A3C342DF9832B3F50FBAF7A39A581D44126
TrID 34.7% (.EXE) UPX compressed Win32 Executable (27066/9/6)
34.1% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4)
8.4% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.7% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon b270e0d292c0c482 (80 x MyDoom)
Reporter TeamDreier
Tags:exe Mydoom

Intelligence


File Origin
# of uploads :
2
# of downloads :
514
Origin country :
DK DK
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
FILE.COM
Verdict:
Malicious activity
Analysis date:
2025-02-14 10:28:07 UTC
Tags:
mydoom upx

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
virus spam smtp worm
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the Windows directory
Delayed reading of the file
Creating a file in the %temp% directory
Connection attempt
Launching a process
Creating a window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
masquerade obfuscated overlay packed packed packed packer_detected upx
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
spre.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Found evasive API chain (may stop execution after checking mutex)
Found suspicious ZIP file
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
Sigma detected: Windows Binaries Write Suspicious Extensions
Yara detected MyDoom
Behaviour
Behavior Graph:
Threat name:
Win32.Worm.MyDoom
Status:
Malicious
First seen:
2025-02-14 10:25:33 UTC
File Type:
PE (Exe)
Extracted files:
9
AV detection:
24 of 24 (100.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mydoom discovery persistence upx worm
Behaviour
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Drops file in Program Files directory
Drops file in Windows directory
UPX packed file
Adds Run key to start application
Downloads MZ/PE file
Detects MyDoom family
MyDoom
Mydoom family
Verdict:
Malicious
Tags:
Win.Worm.Mydoom-5
YARA:
n/a
Unpacked files
SH256 hash:
6d7b896ce389f5cb0c385bfdfd033fb9a8af53de02bb18cc75c80370a6085148
MD5 hash:
521f96dc9c83f2c1ff27b9735968ee27
SHA1 hash:
d01bbca5df6b16e8d1611d02bdb7231c6f018331
SH256 hash:
0791586e7dcc9bf342fd9104bba6cf5abeb32bce9a6f9e9eff08a725fdb2437e
MD5 hash:
6432149c7ea21e833a6201a6dc06c7ed
SHA1 hash:
90bb75ac3f1511cdb10f5faca358beefa56db0ed
Detections:
MyDoom
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:upx_3
Author:Kevin Falcoz
Description:UPX 3.X

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

MyDoom

Executable exe 6d7b896ce389f5cb0c385bfdfd033fb9a8af53de02bb18cc75c80370a6085148

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN_BASE_APIUses Win Base APIKERNEL32.DLL::LoadLibraryA

Comments