MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6fc307063c376b8be2d3a9545959e068884d9cf7f819b176adf676fc4addef7d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 6fc307063c376b8be2d3a9545959e068884d9cf7f819b176adf676fc4addef7d
SHA3-384 hash: b461cdeac8693934dcc5a96567232fc0f1b5761fb89368761bae22181c4e15c5abb992ca6761a94ff0b4bff48b03260c
SHA1 hash: 2b45f14185d2116a994ee51a57dbc3d54ec45cf2
MD5 hash: aac324eac0e231d98a0b43fe19cb69d4
humanhash: fish-fillet-mexico-steak
File name:6fc307063c376b8be2d3a9545959e068884d9cf7f819b176adf676fc4addef7d
Download: download sample
File size:12'652'624 bytes
First seen:2021-07-12 07:04:25 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 196608:UP0FSdiBJVSnR89zkgW0qJmTp65ajjr1DnUs4kRU:40FwiUehk106ajjr1DnUYU
Threatray 711 similar samples on MalwareBazaar
TLSH T101D6231293B95ED2C59279F540635BD447AA2F5F2E3AC1EE4F8B3D98E830983493C2D1
Reporter JAMESWT_WT
Tags:BIOPASS exe signed

Code Signing Certificate

Organisation:Rhaon Entertainment Inc
Issuer:thawte SHA256 Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:2019-01-02T00:00:00Z
Valid to:2021-03-02T23:59:59Z
Serial number: 06808c5934da036a1297a936d72e93d4
Intelligence: 35 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: b3ba6284885eadff7d2f7469c8c4aa2facc804ef21e54266fc543cc28e7c0cd4
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
114
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
6fc307063c376b8be2d3a9545959e068884d9cf7f819b176adf676fc4addef7d
Verdict:
No threats detected
Analysis date:
2021-07-12 07:06:32 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
51 / 100
Signature
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Sigma detected: Execution from Suspicious Folder
Uses whoami command line tool to query computer and username
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 446978 Sample: 6yx1lxHN5L Startdate: 12/07/2021 Architecture: WINDOWS Score: 51 52 Multi AV Scanner detection for submitted file 2->52 54 PE file has a writeable .text section 2->54 56 Sigma detected: Execution from Suspicious Folder 2->56 9 6yx1lxHN5L.exe 502 2->9         started        process3 file4 38 C:\Users\Public\BPS\V2\init.exe, PE32 9->38 dropped 40 C:\Users\...\flashplayerpp_install_cn.exe, PE32 9->40 dropped 42 C:\Users\Public\BPS\V2\win32ts.pyd, PE32 9->42 dropped 44 470 other files (none is malicious) 9->44 dropped 12 init.exe 2 9->12         started        14 flashplayerpp_install_cn.exe 3 146 9->14         started        18 taskkill.exe 1 9->18         started        process5 dnsIp6 20 socketio.exe 5 12->20         started        22 cmd.exe 1 12->22         started        25 conhost.exe 12->25         started        46 36d6250d.tweb.sched.ovscdns.com 101.33.11.88, 443, 49732 TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCN China 14->46 48 36d6250f.tweb.sched.ovscdns.com 211.152.136.71, 443, 49734 TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCN China 14->48 50 5 other IPs or domains 14->50 62 Detected unpacking (changes PE section rights) 14->62 27 conhost.exe 18->27         started        signatures7 process8 signatures9 29 cmd.exe 20->29         started        32 conhost.exe 20->32         started        58 Uses whoami command line tool to query computer and username 22->58 34 conhost.exe 22->34         started        process10 signatures11 60 Uses whoami command line tool to query computer and username 29->60 36 whoami.exe 29->36         started        process12
Threat name:
Win32.Backdoor.BountyGlad
Status:
Malicious
First seen:
2020-11-25 02:27:52 UTC
File Type:
PE (Exe)
Extracted files:
2739
AV detection:
17 of 46 (36.96%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Kills process with taskkill
Modifies Internet Explorer settings
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
467f6766c0fe82abc9286b530d7fa455360c8c7f20a7f28461c54873e4e4de21
MD5 hash:
6be622c4fd3a217b3f45dcd0b1897ffe
SHA1 hash:
0d31265517b835028a81eaf4e16dd3b60d4bc874
SH256 hash:
94bf4afd3a77d76311159daa2f19643a7f7d1e2c4b37807651b328feeef34668
MD5 hash:
1115be7832a7fa6005cb06aa20cdbb5c
SHA1 hash:
d0cf4dcc15749f031b4f5631bd603daf3bae1696
SH256 hash:
457dac9fbf63de9ae8de27ef01bb4cfbf631d8ee080232abff20f22c5afd0507
MD5 hash:
afc7051ea612b771a16aaf0e7521b783
SHA1 hash:
0ffd6781c6a02953d1ab4c3b5d53513a66ec4743
SH256 hash:
c1ea4d7c110167dde5e34def5e87939ff0a085a51da8d2e99ca7a7291002cd04
MD5 hash:
07e3aed600046253e236a90f8a824bde
SHA1 hash:
81939db413eb5f5494167366ce768a2aa6cce624
SH256 hash:
6fc307063c376b8be2d3a9545959e068884d9cf7f819b176adf676fc4addef7d
MD5 hash:
aac324eac0e231d98a0b43fe19cb69d4
SHA1 hash:
2b45f14185d2116a994ee51a57dbc3d54ec45cf2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments