MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 74b4a1409e686d9b8743ba282776b5498084cd4cecc1e10f1d2fde3ee5f3f401. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cutwail


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments 1

SHA256 hash: 74b4a1409e686d9b8743ba282776b5498084cd4cecc1e10f1d2fde3ee5f3f401
SHA3-384 hash: 7848d193be27a708e98189b3cb6f6251d750178c4603e9dafc0150ba15d2aa9a48237082151c8dd3500f316bdff52867
SHA1 hash: 664baf3947853ba9c3dc9a9e0edb14d02baa235f
MD5 hash: d3e225746bf7596be5357ea48802407b
humanhash: carolina-xray-fish-delaware
File name:d3e225746bf7596be5357ea48802407b
Download: download sample
Signature Cutwail
File size:716'800 bytes
First seen:2022-10-24 08:13:52 UTC
Last seen:2022-10-24 09:14:00 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d8fb625dd7569ec473bde6a2c8aeced4 (1 x Cutwail)
ssdeep 12288:hyK3LDODBfZA9d361wKY7JTh6x9cBDVp:1LaTAelCMxqVVp
Threatray 11 similar samples on MalwareBazaar
TLSH T122E4BFB19A1466FBE812A33435959A98E17C3CE65F3E1CCF0AC05ECE42CC5C7863AB55
TrID 40.3% (.EXE) Win64 Executable (generic) (10523/12/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4505/5/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter zbetcheckin
Tags:32 Cutwail exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
225
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
d3e225746bf7596be5357ea48802407b
Verdict:
Malicious activity
Analysis date:
2022-10-24 08:14:55 UTC
Tags:
trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Send many emails (e-Mail Spam)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to resolve many domain names, but no domain seems valid
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 728949 Sample: jByRaPZ2js.exe Startdate: 24/10/2022 Architecture: WINDOWS Score: 100 51 usadig.com 2->51 53 shteeble.com 2->53 55 360 other IPs or domains 2->55 89 Snort IDS alert for network traffic 2->89 91 Multi AV Scanner detection for domain / URL 2->91 93 Antivirus detection for URL or domain 2->93 99 3 other signatures 2->99 8 jByRaPZ2js.exe 3 60 2->8         started        13 pigalicapi.exe 48 2->13         started        15 pigalicapi.exe 47 2->15         started        signatures3 95 System process connects to network (likely due to code injection or exploit) 51->95 97 Tries to resolve many domain names, but no domain seems valid 53->97 process4 dnsIp5 57 www.tc17.com 8->57 59 www.sclover3.com 8->59 65 187 other IPs or domains 8->65 35 C:\Users\user\pigalicapi.exe, PE32 8->35 dropped 37 C:\Users\...\pigalicapi.exe:Zone.Identifier, ASCII 8->37 dropped 101 Drops PE files to the user root directory 8->101 103 Writes to foreign memory regions 8->103 105 Injects a PE file into a foreign processes 8->105 17 svchost.exe 8->17         started        61 vonparis.com 13->61 67 130 other IPs or domains 13->67 107 Machine Learning detection for dropped file 13->107 21 svchost.exe 13->21         started        63 www.vexcom.com 15->63 69 111 other IPs or domains 15->69 23 svchost.exe 15->23         started        file6 109 System process connects to network (likely due to code injection or exploit) 63->109 signatures7 process8 dnsIp9 39 smtp1.sbc.mail.am0.yahoodns.net 17->39 41 mail.airmail.net 66.226.70.66, 25, 49810 INFB2-ASUS United States 17->41 49 3 other IPs or domains 17->49 85 System process connects to network (likely due to code injection or exploit) 17->85 87 Injects a PE file into a foreign processes 17->87 25 svchost.exe 12 17->25         started        29 svchost.exe 2 12 17->29         started        31 svchost.exe 12 17->31         started        33 svchost.exe 12 17->33         started        43 smtp.mail.yahoo.com 21->43 45 smtp.mail.global.gm0.yahoodns.net 21->45 47 envogen.com 21->47 signatures10 process11 dnsIp12 71 mackusick.de 25->71 77 96 other IPs or domains 25->77 111 System process connects to network (likely due to code injection or exploit) 25->111 73 tozzhin.com 29->73 79 122 other IPs or domains 29->79 75 komie.com 31->75 81 74 other IPs or domains 31->81 83 60 other IPs or domains 33->83 signatures13
Threat name:
Win32.Trojan.Cutwail
Status:
Malicious
First seen:
2022-10-24 08:23:38 UTC
File Type:
PE (Exe)
AV detection:
25 of 42 (59.52%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
UPX packed file
Unpacked files
SH256 hash:
f812cff25ac78391ad0621231aa8556d459a3cea3205a04b097744f1e0116a60
MD5 hash:
ab0fa68fdf4a67b3a404250f073e15ba
SHA1 hash:
7eb499acfbe7a3d4d536ab2de8e95be4d7234bbf
SH256 hash:
d9aed9b3407e7cf07c11fe229e6ec2c69d1f6814b71e06a392ea8267de28e86f
MD5 hash:
8e0378a692efa25209e5f2cc9224f532
SHA1 hash:
61104a2cf46a9d674b84ab5721f4c0fdd393cadf
Detections:
win_pushdo_auto
SH256 hash:
74b4a1409e686d9b8743ba282776b5498084cd4cecc1e10f1d2fde3ee5f3f401
MD5 hash:
d3e225746bf7596be5357ea48802407b
SHA1 hash:
664baf3947853ba9c3dc9a9e0edb14d02baa235f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:win_pushdo_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.pushdo.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Cutwail

Executable exe 74b4a1409e686d9b8743ba282776b5498084cd4cecc1e10f1d2fde3ee5f3f401

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-10-24 08:13:58 UTC

url : hxxp://h165621.srv11.test-hf.su/198.exe