MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6f50ae6dfc12c685179e878890fd801fac676ff20b26e08fb1f18092bff76a31. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 6f50ae6dfc12c685179e878890fd801fac676ff20b26e08fb1f18092bff76a31
SHA3-384 hash: 124d8a010e359d806350019fd30aadaef1e16538f2ce888e0dd8d2e308be803c0a0b3b0d0c8ea259bc4efb00b7984cfd
SHA1 hash: daafc8a4a6316eed84bbb378585c911ba26620a3
MD5 hash: 3ef10f90d94961aeb96b46b3f6b820c2
humanhash: fruit-lactose-berlin-failed
File name:3ef10f90d94961aeb96b46b3f6b820c2.exe
Download: download sample
File size:2'979'496 bytes
First seen:2022-05-29 06:34:17 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 0629c55152d38b4029f7de8a08e08d5c (7 x RedLineStealer)
ssdeep 49152:2b4eJPK2juhGxHmrgr14o9yyb9Mgr5i7wIh:2c6K2jsOm8h/yybGgr5Q
Threatray 54 similar samples on MalwareBazaar
TLSH T117D5AD16EB4619BAC943637285CB97377738FF104323EB6BAB09DA31AC232D16D06355
TrID 33.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
21.3% (.EXE) Win64 Executable (generic) (10523/12/4)
13.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.1% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
396
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
3ef10f90d94961aeb96b46b3f6b820c2.exe
Verdict:
Malicious activity
Analysis date:
2022-05-29 06:36:42 UTC
Tags:
loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Сreating synchronization primitives
Creating a window
Query of malicious DNS domain
Unauthorized injection to a system process
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug overlay packed vidar wacatac
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad.rans
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Found Tor onion address
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for submitted file
Obfuscated command line found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Very long command line found
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 635538 Sample: eL5za4kRGx.exe Startdate: 29/05/2022 Architecture: WINDOWS Score: 100 63 Malicious sample detected (through community Yara rule) 2->63 65 Antivirus detection for URL or domain 2->65 67 Multi AV Scanner detection for submitted file 2->67 69 3 other signatures 2->69 12 eL5za4kRGx.exe 1 2->12         started        process3 signatures4 77 Writes to foreign memory regions 12->77 79 Allocates memory in foreign processes 12->79 81 Injects a PE file into a foreign processes 12->81 15 AppLaunch.exe 18 85 12->15         started        20 WerFault.exe 23 9 12->20         started        22 conhost.exe 12->22         started        process5 dnsIp6 59 soapbeginshops.com 34.118.86.4, 49765, 49770, 80 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 15->59 45 C:\RCX83A6.tmp, PE32 15->45 dropped 47 C:\RCX8088.tmp, PE32 15->47 dropped 49 C:\RCX7CBE.tmp, PE32 15->49 dropped 53 71 other files (25 malicious) 15->53 dropped 61 Modifies existing user documents (likely ransomware behavior) 15->61 24 unarchiver.exe 5 15->24         started        51 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 20->51 dropped file7 signatures8 process9 process10 26 cmd.exe 2 24->26         started        28 7za.exe 2 24->28         started        process11 30 powershell.exe 19 26->30         started        32 conhost.exe 26->32         started        34 conhost.exe 28->34         started        process12 36 mshta.exe 16 30->36         started        dnsIp13 55 soapbeginshops.com 36->55 71 Suspicious powershell command line found 36->71 73 Obfuscated command line found 36->73 75 Very long command line found 36->75 40 powershell.exe 36->40         started        signatures14 process15 dnsIp16 57 soapbeginshops.com 40->57 43 conhost.exe 40->43         started        process17
Threat name:
Win32.Trojan.Nekark
Status:
Malicious
First seen:
2022-05-29 03:56:34 UTC
File Type:
PE (Exe)
AV detection:
16 of 41 (39.02%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Downloads MZ/PE file
Unpacked files
SH256 hash:
b2a54787ffa8aee827b7dca5be6c120c27637698274f318efc0c425ec94b8c20
MD5 hash:
a62cea69f3aa73b00a2e4e1aaedffc89
SHA1 hash:
18bb87b6d6597b5fb6e07d7d5a07634274cc3cdf
SH256 hash:
6f50ae6dfc12c685179e878890fd801fac676ff20b26e08fb1f18092bff76a31
MD5 hash:
3ef10f90d94961aeb96b46b3f6b820c2
SHA1 hash:
daafc8a4a6316eed84bbb378585c911ba26620a3
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 6f50ae6dfc12c685179e878890fd801fac676ff20b26e08fb1f18092bff76a31

(this sample)

  
Delivery method
Distributed via web download

Comments