MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6f173aec9830677d751097483b2cd8b9a1609886d0c445568b6f52cf9461a668. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Sodinokibi


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 6f173aec9830677d751097483b2cd8b9a1609886d0c445568b6f52cf9461a668
SHA3-384 hash: 0d54f28d03fc115dc8a27f8df5d12294fd48295dad48d6d24293f26e9f257b669e1e63ae4a25206b4c13c6723735ef6b
SHA1 hash: 220c2c1b5b625e800fe6d5e72d8971f25310ef63
MD5 hash: 07679969f48c4e0a83b9eb3ca31e9a2f
humanhash: burger-social-table-fanta
File name:ohaan.exe
Download: download sample
Signature Sodinokibi
File size:292'864 bytes
First seen:2020-06-16 11:45:33 UTC
Last seen:2020-06-17 09:22:04 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash a0e066e1542eef3eebaa4fca1fb38e94 (1 x Sodinokibi)
ssdeep 3072:vAcc99Ruu7OZ1tVj1Ox+Av/tzxQ0YR93NLixOLRptibY/u44Sj09bIm:vAcc9b/Sj1OxfNYR93NuxidD/0Im
Threatray 196 similar samples on MalwareBazaar
TLSH DB549D01B6D4C071E173063208F8BA715938FD6A4B359ACB7B887F5A1A781D1673AF63
Reporter malwaretracekr
Tags:Sodinokibi


Avatar
malwaretracekr
https://twitter.com/malwaretracekr

Intelligence


File Origin
# of uploads :
3
# of downloads :
454
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.DanaBot
Status:
Malicious
First seen:
2020-06-16 11:47:02 UTC
File Type:
PE (Exe)
Extracted files:
26
AV detection:
28 of 31 (90.32%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
ransomware persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Drops file in Program Files directory
Modifies service
Sets desktop wallpaper using registry
Enumerates connected drives
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments