MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 74cf2e1f4dce793dc8bc01b3d1691e102c08bb15a3c65bb5c06a48baba0e1fb5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 74cf2e1f4dce793dc8bc01b3d1691e102c08bb15a3c65bb5c06a48baba0e1fb5
SHA3-384 hash: 2b0352b6e82dad712f11d7f798b70db8ae3c2615a0109a8665b8a34cf04b6fedac8d37d6d41f599120fe9fbe5a10264c
SHA1 hash: be899148b1549b1cec6e2eb9db0f94e700fc0334
MD5 hash: a4d1aef9ba64ad4300c744297795bc42
humanhash: fourteen-kentucky-alabama-fish
File name:caf3
Download: download sample
File size:1'089'665 bytes
First seen:2021-08-28 01:12:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 65819c91413f83b464d6a3d119bd6467 (1 x BazaLoader)
ssdeep 12288:9fHnu1hxBOwTdG7MDsDbQg779SweGIvdZOyjGU+G0VCspXMl3A6Gnzq9PBa8nT2:pHK3OwTd8MQDbQgHgUIv1jGUXuCs9qW
Threatray 14 similar samples on MalwareBazaar
TLSH T11235909514C4AFE7DCB6F4FD8EEAE016FD121650C1E5854946C0084A0AF93F3A6AFB39
Reporter malwarelabnet
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
189
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
caf3
Verdict:
No threats detected
Analysis date:
2021-08-28 01:14:57 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
60 / 100
Signature
Sigma detected: CobaltStrike Load by Rundll32
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 473060 Sample: caf3 Startdate: 28/08/2021 Architecture: WINDOWS Score: 60 47 Sigma detected: CobaltStrike Load by Rundll32 2->47 8 loaddll64.exe 1 2->8         started        11 rundll32.exe 2->11         started        process3 signatures4 51 Tries to detect virtualization through RDTSC time measurements 8->51 13 regsvr32.exe 13 8->13         started        17 cmd.exe 1 8->17         started        19 iexplore.exe 1 75 8->19         started        21 20 other processes 8->21 process5 dnsIp6 45 104.248.170.50, 443, 49763 DIGITALOCEAN-ASNUS United States 13->45 53 System process connects to network (likely due to code injection or exploit) 13->53 55 Tries to detect virtualization through RDTSC time measurements 13->55 23 rundll32.exe 17->23         started        26 iexplore.exe 2 150 19->26         started        29 WerFault.exe 21->29         started        31 WerFault.exe 21->31         started        33 WerFault.exe 21->33         started        signatures7 process8 dnsIp9 49 Tries to detect virtualization through RDTSC time measurements 23->49 35 WerFault.exe 23->35         started        37 edge.gycpi.b.yahoodns.net 87.248.118.22, 443, 49754, 49755 YAHOO-DEBDE United Kingdom 26->37 39 dart.l.doubleclick.net 142.250.203.102, 443, 49742, 49743 GOOGLEUS United States 26->39 43 14 other IPs or domains 26->43 41 192.168.2.1 unknown unknown 29->41 signatures10 process11
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
74cf2e1f4dce793dc8bc01b3d1691e102c08bb15a3c65bb5c06a48baba0e1fb5
MD5 hash:
a4d1aef9ba64ad4300c744297795bc42
SHA1 hash:
be899148b1549b1cec6e2eb9db0f94e700fc0334
Malware family:
BazarLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments