MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 713984a9d714e58c92b1338df4c54b55da27753d18c09d6a45427fd85c145454. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



JobCrypter


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 713984a9d714e58c92b1338df4c54b55da27753d18c09d6a45427fd85c145454
SHA3-384 hash: 5850bbdcc81faf7b43579ef7eab80ecdd75ac4163068c56cc28994c68f35a44f6b7bf8ef44546c248e00bf68fb47d5f0
SHA1 hash: bd9a368a2f8ae2ae2946093bf5328770171ad56f
MD5 hash: e45cca363f250cf25222ee278d8d7599
humanhash: south-potato-nevada-uranus
File name:FR1000144787_1.bin
Download: download sample
Signature JobCrypter
File size:396'800 bytes
First seen:2021-03-23 07:49:20 UTC
Last seen:2021-03-23 09:36:17 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 6144:DsMbHN+qs11FQexNrz5IL9KsxHc+EXWCciI2IRdLXRtS:Df+qsm8ZziFOmbZRlXRtS
Threatray 675 similar samples on MalwareBazaar
TLSH 21844B69B1428A02C6D8ABF086FBCC3447A65DC2777AD38939043A6E1DF5FB44D852CD
Reporter JAMESWT_WT
Tags:exe Filecoder.ABC JobCrypter

Intelligence


File Origin
# of uploads :
2
# of downloads :
1'436
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
FR1000144787.exe
Verdict:
Malicious activity
Analysis date:
2020-07-07 13:15:07 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Using the Windows Management Instrumentation requests
DNS request
Sending a custom TCP request
Creating a file
Modifying a system executable file
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
76 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
Antivirus / Scanner detection for submitted sample
Drops script or batch files to the startup folder
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Dothetuk
Status:
Malicious
First seen:
2020-07-07 08:06:22 UTC
File Type:
PE (.Net Exe)
Extracted files:
19
AV detection:
30 of 48 (62.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:ryuk ransomware spyware stealer
Behaviour
Suspicious use of AdjustPrivilegeToken
Drops startup file
Reads user/profile data of web browsers
Ryuk
Unpacked files
SH256 hash:
688fdf60740bea0f758c5f2d0b5082c6adeee589a57696d5acbe042ed9d52cb6
MD5 hash:
a507ecd9daa696a5a510974cea0f791b
SHA1 hash:
e37193f8a48464199079051dd3679ac38f867683
SH256 hash:
713984a9d714e58c92b1338df4c54b55da27753d18c09d6a45427fd85c145454
MD5 hash:
e45cca363f250cf25222ee278d8d7599
SHA1 hash:
bd9a368a2f8ae2ae2946093bf5328770171ad56f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments