MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 72df08b0afbabf56b5be96ecf032604625cc57e33d65744af28646d2d3f4c4ca. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Worm.Ramnit


Vendor detections: 14


Intelligence 14 IOCs YARA 10 File information Comments

SHA256 hash: 72df08b0afbabf56b5be96ecf032604625cc57e33d65744af28646d2d3f4c4ca
SHA3-384 hash: 97871b3e8d4b4622e95fc15f3b6da4ecedbc701fb69e79e93db20b2517a57b8d7c0faa67a1a44a64d596d4d5c55e80df
SHA1 hash: a05e321faa59d12ae409e1ebe4a40afd00aa2b01
MD5 hash: da68b44e47c3ead8a714a6f716302a39
humanhash: utah-muppet-eight-sixteen
File name:250427-2kc8gavp14.bin
Download: download sample
Signature Worm.Ramnit
File size:115'712 bytes
First seen:2025-04-27 22:43:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7faedebf43a98dcd3e0644d88a8391cb (1 x Worm.Virut, 1 x Worm.Ramnit)
ssdeep 1536:Rxf0u7TnqMGGGMZZZyVb1t9e4GNqBvrPzO7/YiMIATcjiNy9zQZlvPo9:Rxf02DqbJ1y4GNq5jz+/YiMa3QZ
TLSH T143B3E1470233BAA8D8A225B5867F373C8D1ADE3DE0E2407EB4C93A5917FD50827C5627
TrID 52.9% (.EXE) Win32 Executable (generic) (4504/4/1)
23.5% (.EXE) Generic Win/DOS Executable (2002/3)
23.5% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
dhash icon f8697868b2f069d4 (5 x DarkVisionRAT, 1 x Worm.Virut, 1 x Emmenhtal)
Reporter UNP4CK
Tags:Worm.Ramnit

Intelligence


File Origin
# of uploads :
1
# of downloads :
96
Origin country :
GB GB
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
250427-2kc8gavp14.bin
Verdict:
No threats detected
Analysis date:
2025-04-27 22:46:33 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
virut spawn blic sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a file in the Program Files subdirectories
Creating a process from a recently created file
Launching a process
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Searching for the browser window
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
crypt installer masquerade microsoft_visual_cc rat virtual xpack
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found evasive API chain (may stop execution after checking mutex)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Sigma detected: Suspect Svchost Activity
Writes to foreign memory regions
Yara detected Ramnit
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1675691 Sample: 250427-2kc8gavp14.bin.exe Startdate: 28/04/2025 Architecture: WINDOWS Score: 100 64 www.msn.com 2->64 66 www-msn-com.a-0003.a-msedge.net 2->66 68 16 other IPs or domains 2->68 82 Malicious sample detected (through community Yara rule) 2->82 84 Antivirus detection for dropped file 2->84 86 Antivirus / Scanner detection for submitted sample 2->86 88 7 other signatures 2->88 12 250427-2kc8gavp14.bin.exe 4 2->12         started        16 msedge.exe 42 485 2->16         started        19 msedge.exe 2->19         started        21 msedge.exe 2->21         started        signatures3 process4 dnsIp5 58 C:\Program Files (x86)\...\WaterMark.exe, PE32 12->58 dropped 60 C:\...\WaterMark.exe:Zone.Identifier, ASCII 12->60 dropped 96 Found evasive API chain (may stop execution after checking mutex) 12->96 23 WaterMark.exe 12->23         started        62 239.255.255.250 unknown Reserved 16->62 98 Maps a DLL or memory area into another process 16->98 26 msedge.exe 16->26         started        29 msedge.exe 16->29         started        31 identity_helper.exe 16->31         started        33 identity_helper.exe 16->33         started        35 msedge.exe 19->35         started        37 msedge.exe 21->37         started        file6 signatures7 process8 dnsIp9 90 Writes to foreign memory regions 23->90 92 Allocates memory in foreign processes 23->92 94 Injects a PE file into a foreign processes 23->94 39 iexplore.exe 70 99 23->39         started        41 svchost.exe 23->41         started        43 iexplore.exe 23->43         started        70 googlehosted.l.googleusercontent.com 142.250.72.129, 443, 49729 GOOGLEUS United States 26->70 72 chrome.cloudflare-dns.com 162.159.61.3, 443, 49751, 49757 CLOUDFLARENETUS United States 26->72 74 2 other IPs or domains 26->74 signatures10 process11 process12 45 iexplore.exe 6 52 39->45         started        48 WerFault.exe 22 16 41->48         started        dnsIp13 76 c-msn-pme.trafficmanager.net 20.125.62.241, 443, 49739, 49740 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 45->76 78 onedscolprdgwc05.germanywestcentral.cloudapp.azure.com 20.52.64.201, 443, 49749, 49750 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 45->78 80 4 other IPs or domains 45->80 50 ie_to_edge_stub.exe 1 45->50         started        52 ssvagent.exe 501 45->52         started        process14 process15 54 msedge.exe 16 50->54         started        process16 56 msedge.exe 54->56         started       
Threat name:
Win32.Virus.Virut
Status:
Malicious
First seen:
2011-10-05 17:04:00 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
35 of 36 (97.22%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:ramnit banker discovery spyware stealer trojan upx worm
Behaviour
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Browser Information Discovery
Program crash
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
UPX packed file
Executes dropped EXE
Ramnit
Ramnit family
Verdict:
Malicious
Tags:
Win.Virus.Sality-6724125-0
YARA:
n/a
Unpacked files
SH256 hash:
72df08b0afbabf56b5be96ecf032604625cc57e33d65744af28646d2d3f4c4ca
MD5 hash:
da68b44e47c3ead8a714a6f716302a39
SHA1 hash:
a05e321faa59d12ae409e1ebe4a40afd00aa2b01
SH256 hash:
dd041821e180423250027f2c7a22a6514786f904c2a984baaeb33be72f68b684
MD5 hash:
51b596e74dd95131d3200c3c3693d02c
SHA1 hash:
2de29f5c83d61bbdf15fe4369c0a1a56c9dd3a02
Detections:
win_ramnit_g0 win_ramnit_auto
SH256 hash:
1ab69d9ad75d58e10c83a38d56ae028e57a94decc9da9515f4341036a0ea1efb
MD5 hash:
ccd57c2af60720f5c93ea3aec7fcde69
SHA1 hash:
c872cd2dd63a9eb195445ee84d692bf9841ac1c9
Detections:
win_ramnit_g0 win_ramnit_auto win_ramnit_g1
SH256 hash:
d7724f7dcbfa432d4236902ea46d6ccf63f3f1a3e9b1582a9a48f6ae149150df
MD5 hash:
ba2d1c78c4b3b3fc35770749e9ad5f86
SHA1 hash:
888ba69f247886d09274bf4833e17b5e302a607d
Detections:
win_ramnit_g0 win_ramnit_auto win_ramnit_g1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:Ramnit
Author:kevoreilly
Description:Ramnit Payload
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:UPX20030XMarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
Rule name:win_ramnit_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.ramnit.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and Threadsadvapi32.dll::OpenProcessToken
kernel32.dll::CloseHandle
WIN_BASE_IO_APICan Create Fileskernel32.dll::CopyFileA
kernel32.dll::CreateFileA
kernel32.dll::MoveFileA
kernel32.dll::RemoveDirectoryA
version.dll::GetFileVersionInfoSizeA
version.dll::GetFileVersionInfoA
WIN_BASE_USER_APIRetrieves Account Informationadvapi32.dll::LookupPrivilegeValueA
WIN_REG_APICan Manipulate Windows Registryadvapi32.dll::RegOpenKeyExA
advapi32.dll::RegQueryValueExA
kernel32.dll::RegisterWowExec
WIN_USER_APIPerforms GUI Actionsuser32.dll::CreateWindowExA

Comments