MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 708ca97e578a8821640200bb5d9b030487b3159192eeda5aa20875bac0748f7d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 708ca97e578a8821640200bb5d9b030487b3159192eeda5aa20875bac0748f7d
SHA3-384 hash: 6d3a067e882637c34083d337228a182deeca459c6f2a62a3a1528ef7a669f75ecf83d9ea696f1a37987306bd3b466818
SHA1 hash: fa8bd6b77f57735e0d29c23418d1c7b24e52b26d
MD5 hash: 6d142b3932519472c22ca86a63d6f5d1
humanhash: hotel-burger-four-cat
File name:HSBC Payment Advice.exe
Download: download sample
File size:919'552 bytes
First seen:2021-03-25 10:14:22 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'616 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 12288:gdDI7xC8all7wrVvNCshpdGrwWQ5yvq/KK04mmcEoHSyNLGuW+EjDGHdi4MVJK:gas8ikxvN5dUQg8MsqSyNLVW+6Ai4O8
Threatray 93 similar samples on MalwareBazaar
TLSH 8315DF7E155A6F33D97E87B488E60043F771652A3196EA0C0DD207D51BA2763B88FA0F
Reporter abuse_ch
Tags:exe HSBC


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: hrl.comsats.net.pk
Sending IP: 203.124.39.163
From: HSBC BANK PAKISTAN <atiqa@rdlpk.com>
Subject: HSBC Payment Advice - Advice Ref:[GLVC30693856] / Priority payment / Customer Ref:[8000150421]
Attachment: HSBC Payment Advice.gz (contains "HSBC Payment Advice.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
118
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
HSBC Payment Advice.exe
Verdict:
No threats detected
Analysis date:
2021-03-25 10:53:03 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Launching a process
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
.NET source code contains very large strings
Initial sample is a PE file and has a suspicious name
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Malicious
First seen:
2021-03-25 10:15:09 UTC
AV detection:
16 of 29 (55.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
708ca97e578a8821640200bb5d9b030487b3159192eeda5aa20875bac0748f7d
MD5 hash:
6d142b3932519472c22ca86a63d6f5d1
SHA1 hash:
fa8bd6b77f57735e0d29c23418d1c7b24e52b26d
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe 708ca97e578a8821640200bb5d9b030487b3159192eeda5aa20875bac0748f7d

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments