MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Adhubllka


Vendor detections: 13


Intelligence 13 IOCs YARA 5 File information Comments 1

SHA256 hash: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f
SHA3-384 hash: 04238836bdcff533f803dcb0bc0caac2a6bf1d90b878f2332a40de3a41db17b00a54adc94f09e1eb6eca69e3e31bd4be
SHA1 hash: acbbba95fc6982f63bcc1981d7d33df26a8d439d
MD5 hash: ab8f0580cc0d74e0215e7de19515c8a6
humanhash: chicken-pip-undress-don
File name:ab8f0580cc0d74e0215e7de19515c8a6
Download: download sample
Signature Adhubllka
File size:718'848 bytes
First seen:2023-03-14 18:48:09 UTC
Last seen:2023-03-14 20:28:49 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'660 x AgentTesla, 19'470 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:U4LGLJtHUGH3HV3y9dsrlHMg2i6lqHIAkIdV2:YxHV3g2HmlPM
Threatray 68 similar samples on MalwareBazaar
TLSH T1FDE49DFC48BF6126F5BCEEB05AD14917A3E0952B370DBE1B16E206170202645FCE75AE
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter zbetcheckin
Tags:32 Adhubllka exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
251
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ab8f0580cc0d74e0215e7de19515c8a6
Verdict:
Malicious activity
Analysis date:
2023-03-14 18:50:39 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Creating a file
Searching for synchronization primitives
Changing a file
Moving a recently created file
Сreating synchronization primitives
Moving a file to the Program Files directory
Moving a file to the Program Files subdirectory
Launching a process
Modifying a system executable file
Setting browser functions hooks
Encrypting user's files
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys comodo lokibot mokes packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
BitRansomware
Verdict:
Malicious
Result
Threat name:
Cryptolocker
Detection:
malicious
Classification:
rans.spre.evad
Score:
100 / 100
Signature
Contains functionality to detect sleep reduction / modifications
Drops executable to a common third party application directory
Found potential ransomware demand text
Found ransom note / readme
Found Tor onion address
Infects executable files (exe, dll, sys, html)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes a notice file (html or txt) to demand a ransom
Yara detected AntiVM3
Yara detected Cryptolocker ransomware
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Heracles
Status:
Malicious
First seen:
2023-03-14 18:49:07 UTC
File Type:
PE (.Net Exe)
Extracted files:
15
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
persistence ransomware
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of SetThreadContext
Drops desktop.ini file(s)
Enumerates connected drives
Loads dropped DLL
Modifies Installed Components in the registry
Unpacked files
SH256 hash:
39fd1fa696f3c1845a5c04f15b603d017d4ef9d0bab93a6bc2c1103c1dca7718
MD5 hash:
0bffb261ea28116e90286c5095367f2a
SHA1 hash:
9d35101e2631cae6c724fa20c101a0a1c2ee5adc
Detections:
win_adhubllka_auto win_adhubllka_a0
SH256 hash:
6d9534566502b1f65914aa3764d07d67c3d890345d364674fa25e5ee0e029a06
MD5 hash:
b508dc1f28c3e347b559a61829dd7cd3
SHA1 hash:
9187831f2a9bcce0118b7a55d45d061057542ec4
SH256 hash:
ea8d4c91ec5bba5e1db6c17730d7ba5cdbb5ff3c1a777f70c90e91ce599d9b5d
MD5 hash:
27f5124bf8f451bca8d8a15c73c4f521
SHA1 hash:
5fd557e109b8fd1c3b362b64f0ba9f1600c07211
SH256 hash:
94ba10bed7bd6a92612b5e214f006a74c4ff0b787313b5ca0ab17abfe2184881
MD5 hash:
14df0b1f4a1ea42c43eac6e28d04ffaf
SHA1 hash:
f8d63d43bbf44b4bf9faa3085e398b12cfcb274a
SH256 hash:
12c9a8fff21606de958419cd83c5d30f159edea0061df163f50c7427af3ae87e
MD5 hash:
393fd601d0d886f538cb4a303c3d8425
SHA1 hash:
f5e7c52f80a9e4849619fc75d5009391a33d1db1
SH256 hash:
f1ad18315162a3ac40e2ed9b9093ea5ce83cbabab40cac5fdac75bf3a2334021
MD5 hash:
55acb94660a85d7df8c068d06305bc90
SHA1 hash:
db38856953cd55ae1dea77208805b635720b992a
SH256 hash:
f6de6db90d8ce4bc60bfb185e8844156fea1416401763172944417c470b6b149
MD5 hash:
4775553544747edff8f97c3e101fa4b4
SHA1 hash:
be0b05bedcaed7784962a677a95b6a319ab72b37
SH256 hash:
2bdab0b798d00ad4edb8081dbbf7d233e4130dbf7dcd1ad167e55951111848ad
MD5 hash:
b2d7e02a3388c23c2109e444e12898b5
SHA1 hash:
41a06ebb5cf9a62865a2cd94dd5c2240cb8bf35e
SH256 hash:
1b6f077e3a7079d68b6bb15ecc45233e9e0f3c35dc6291575b16134deaa19450
MD5 hash:
440b42fb342f002237d1513aac5e3cda
SHA1 hash:
18298c3aeaefee55e018884b27af87cfccf2e924
SH256 hash:
7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f
MD5 hash:
ab8f0580cc0d74e0215e7de19515c8a6
SHA1 hash:
acbbba95fc6982f63bcc1981d7d33df26a8d439d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:pe_imphash
Rule name:RANSOM_win_Adhubllka
Author:KrknSec
Description:Detects Adhubllka ransomware.
Reference:https://malpedia.caad.fkie.fraunhofer.de/details/win.adhubllka
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_adhubllka_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.adhubllka.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Adhubllka

Executable exe 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-03-14 18:48:14 UTC

url : hxxp://167.88.170.23/501.exe