MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 711348ec1fb1f2a06aa394618b3dde8e91b29ba6b0097d545429521ad54326f1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: 711348ec1fb1f2a06aa394618b3dde8e91b29ba6b0097d545429521ad54326f1
SHA3-384 hash: 55ced04ade2daefc06f923c7cb9c158cfc6a5c18aed454651e721585cb55900bdbab1ef99ac4da63f71a9b3cda2e0e43
SHA1 hash: 7bb8328c39c8ec388ffe72e947a85fd4c9c690c6
MD5 hash: 9c62dcbe1bf87d6e1fd16ed8e93bb1fb
humanhash: edward-ten-missouri-lactose
File name:2.exe
Download: download sample
File size:3'730'432 bytes
First seen:2022-08-05 07:49:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2c5f2513605e48f2d8ea5440a870cb9e (60 x Babadeda, 6 x AveMariaRAT, 5 x CoinMiner)
ssdeep 98304:ZNWM1/2EzzhKQxphovCYURsccxTnRqviklCnR:Zx2EzdKQxp6CYMyTnR/R
Threatray 2'331 similar samples on MalwareBazaar
TLSH T1310602C1C9858892E97D8D3410B72D3A423B6F7BA96C5DE99E4CF12176B38CD1039A1F
TrID 37.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
20.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
12.7% (.EXE) Win64 Executable (generic) (10523/12/4)
7.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon 71694d4dccc8c8d5
Reporter obfusor
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
261
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
FuacasFire.exe
Verdict:
Malicious activity
Analysis date:
2022-07-10 06:31:06 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for synchronization primitives
Сreating synchronization primitives
Launching a service
Creating a file
Creating a window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Searching for the window
DNS request
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Charming Kitten
Verdict:
Malicious
Result
Threat name:
Babadeda
Detection:
malicious
Classification:
troj.evad
Score:
63 / 100
Signature
Adds a directory exclusion to Windows Defender
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Powershell adding suspicious path to exclusion list
Uses bcdedit to modify the Windows boot settings
Yara detected Babadeda
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 679119 Sample: 2.exe Startdate: 05/08/2022 Architecture: WINDOWS Score: 63 31 Multi AV Scanner detection for dropped file 2->31 33 Sigma detected: Powershell adding suspicious path to exclusion list 2->33 35 Multi AV Scanner detection for submitted file 2->35 37 2 other signatures 2->37 7 2.exe 15 2->7         started        process3 file4 23 C:\Users\user\Desktop\SysWin.exe, PE32 7->23 dropped 25 C:\Users\user\Desktop25Sudo.exe, PE32+ 7->25 dropped 27 C:\Users\user\AppData\Local\Temp\...\5C3B.bat, ASCII 7->27 dropped 29 5 other files (none is malicious) 7->29 dropped 10 cmd.exe 1 7->10         started        13 conhost.exe 7->13         started        process5 signatures6 39 Uses bcdedit to modify the Windows boot settings 10->39 41 Adds a directory exclusion to Windows Defender 10->41 15 NSudo.exe 10->15         started        17 NSudo.exe 10->17         started        19 NSudo.exe 10->19         started        21 16 other processes 10->21 process7
Threat name:
Win32.Ransomware.LockBit
Status:
Malicious
First seen:
2022-07-10 09:36:06 UTC
File Type:
PE (Exe)
Extracted files:
20
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
0eb584706bba4a652b094cc88cb9f11fc33c84046a42a5f9433094d6a25f9dab
MD5 hash:
ee673be93752da4f4f15fdca617b9360
SHA1 hash:
7d163f90e484a4bd73a6f38519d527d5537675be
Detections:
win_extreme_rat_w1
SH256 hash:
b6bcf5a57aeed49f051574af405c21d36edb21315f9fc855d762d091897dab02
MD5 hash:
10303266d08f7f623a737edac3cb086e
SHA1 hash:
1ae7f139feacd3027444d367d06e4c2810050a9c
SH256 hash:
7c98d231ce2c49803b4b145b9941cee4169e10e356cc55373473085e8ee23167
MD5 hash:
fbe39cf5e41b7f300c30c1e84daf04f9
SHA1 hash:
fc3cf5513cb25b10406010f1f349a6c9f2424a8a
SH256 hash:
bad0228364fcc33d06e5dd0ac80ff47015463ab1420d60046cad9b09eb96baff
MD5 hash:
9a6f3ef5db5aca6e26dec2490bfd9c2c
SHA1 hash:
2b62922043d3c525fb39470e8fab328727331e5b
SH256 hash:
11c3ee074177dccf5acc841b1a1f9fa17add52aaf183d9d37c4b5eca0d8a4b63
MD5 hash:
43e386fbddf1b966a91546d93aaee328
SHA1 hash:
11ed6bb03b2e533722f5de39af0723c9e4187adf
SH256 hash:
0377585ec50ed2e1b3d8519be272599f31024accd20b484ddae8240e09cc83b4
MD5 hash:
13d3997b43c3d5cbafb0ff10b6f0dee1
SHA1 hash:
e650a76f3fa8d28e2ff3751ccf44d124ef2b82bd
SH256 hash:
00b9c0120df0595184523a3620ef9b3c3e11fc0e61d366d7eeabb646647cfceb
MD5 hash:
bd1f243ee2140f2f6118a7754ea02a63
SHA1 hash:
cdf7dd7dd1771edcc473037af80afd7e449e30d9
SH256 hash:
e37aa72bca3cecb9bdbe51cbd81ec1143bb17163088a1379a4ccb93f5d881e76
MD5 hash:
5cac4fe734fc8454ccb847e030beee38
SHA1 hash:
34298fe220e35f614b2c837cf1dc2604ab0882d6
SH256 hash:
711348ec1fb1f2a06aa394618b3dde8e91b29ba6b0097d545429521ad54326f1
MD5 hash:
9c62dcbe1bf87d6e1fd16ed8e93bb1fb
SHA1 hash:
7bb8328c39c8ec388ffe72e947a85fd4c9c690c6
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments