MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6ef9af06422a0b2cc70ae23b0439edf9b8e950c91596087cd537d6435c9c85e4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments 1

SHA256 hash: 6ef9af06422a0b2cc70ae23b0439edf9b8e950c91596087cd537d6435c9c85e4
SHA3-384 hash: 8eab3067899da7a7f7e8e4d684105fd35586027eb7966fad0af62b3eab9c82f1238adb2def6a761467c80e8fdb7f2275
SHA1 hash: e376032e8b1d79a7b1354dfe5fa482b585efc96f
MD5 hash: 0817afc9180089bbeb586f449ded2adf
humanhash: kilo-eleven-enemy-summer
File name:0817afc9180089bbeb586f449ded2adf
Download: download sample
File size:324'608 bytes
First seen:2021-09-17 04:25:40 UTC
Last seen:2021-09-17 04:51:34 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 410705447b2186b51cd6d6e90a878e3a (6 x RaccoonStealer, 3 x Tofsee, 1 x CoinMiner)
ssdeep 6144:8YZLyt88dQ9Js8BIzOc/uRs50B2hKVcmBpeuT9z5JH5dI:BS88ans86yar2B2sVRpfu
Threatray 14 similar samples on MalwareBazaar
TLSH T1B964E1013590C832C7952931683797A04BBAFDE2796C92477BA83BBEAF713D09635317
dhash icon c8e0f8a8f8f0ccc0
Reporter zbetcheckin
Tags:32 exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
138
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0817afc9180089bbeb586f449ded2adf
Verdict:
Suspicious activity
Analysis date:
2021-09-17 04:26:55 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
52 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 484880 Sample: tF8ELgRKF1 Startdate: 17/09/2021 Architecture: WINDOWS Score: 52 34 Multi AV Scanner detection for submitted file 2->34 36 Machine Learning detection for sample 2->36 7 tF8ELgRKF1.exe 1 2->7         started        process3 process4 9 WerFault.exe 9 7->9         started        12 WerFault.exe 9 7->12         started        14 WerFault.exe 9 7->14         started        16 4 other processes 7->16 file5 22 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 9->22 dropped 24 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 12->24 dropped 26 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 14->26 dropped 28 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 16->28 dropped 30 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 16->30 dropped 32 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 16->32 dropped 18 taskkill.exe 1 16->18         started        20 conhost.exe 16->20         started        process6
Threat name:
Win32.Infostealer.Racealer
Status:
Malicious
First seen:
2021-09-17 04:26:05 UTC
AV detection:
20 of 45 (44.44%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Deletes itself
Unpacked files
SH256 hash:
36d5afdcb0fa8d512656aa5a59f34018885bb1b9dd5cc0780766552809cfb45f
MD5 hash:
4f9c74430d72b9500a0d99cc28fc7a7e
SHA1 hash:
a67cf6a62a6cabec501aa2f14e97c48b71dbd97c
SH256 hash:
6ef9af06422a0b2cc70ae23b0439edf9b8e950c91596087cd537d6435c9c85e4
MD5 hash:
0817afc9180089bbeb586f449ded2adf
SHA1 hash:
e376032e8b1d79a7b1354dfe5fa482b585efc96f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 6ef9af06422a0b2cc70ae23b0439edf9b8e950c91596087cd537d6435c9c85e4

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-09-17 04:25:41 UTC

url : hxxp://194.145.227.159/pub.php?pub=two/