MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 759d8edcb0fc7b6ed288d647cc6fdf9598d944b922654fae2e999d2f89407b3d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 6
| SHA256 hash: | 759d8edcb0fc7b6ed288d647cc6fdf9598d944b922654fae2e999d2f89407b3d |
|---|---|
| SHA3-384 hash: | 30ada0ac2a747cc12608aa4011ed3ed99798e4892310d75503abfa70bd4ba9a96f739f1132c064ff7c91f4c0a8c18cea |
| SHA1 hash: | b7e4336cc17d6e982263c7dac0d7441179fcd7d4 |
| MD5 hash: | f3696bbcc913c9df56fc660729fc4e80 |
| humanhash: | twenty-carpet-bravo-mike |
| File name: | jql.jar |
| Download: | download sample |
| File size: | 2'562'873 bytes |
| First seen: | 2024-05-09 07:25:56 UTC |
| Last seen: | 2024-05-09 07:27:19 UTC |
| File type: | |
| MIME type: | application/java-archive |
| ssdeep | 49152:uRwxYxDymqTBaAvJjp9H9wFSCtf+iCk/PCIwcf3GDhO8ZxJDk1Zz9E+yCeaE:mwoymq1zvzbEfhl/PCXcOnxyjBRXE |
| TLSH | T14FC5E137AE9BC478DE7784B351C282826C2FA9A8AD0B90FE13905DD54B60D470752FF9 |
| TrID | 72.9% (.JAR) Java Archive (13500/1/2) 21.6% (.ZIP) ZIP compressed archive (4000/1) 5.4% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1) |
| Reporter | |
| Tags: | CryptoShuffler Downloader jar java TURS |
CyberRaiju
Java-based Malware Downloader/Backdoor from Fake Wasabi Wallet Installer:https://bazaar.abuse.ch/sample/fdf2288ffbb80fc64122ffaa3442d3b60cb0bbe99dcf9d6f6c3d1565f96cde43/
User Agent: "Mozilla/5.0"
C2: https://dailynewspagechannel[.]com
Persistence: User Run Key
Purpose: Download and run executable or Java Archive tasked to it from the C2
Naming 'TURS Agent' in the absence of any known malware downloader family.
Intelligence
File Origin
# of uploads :
2
# of downloads :
118
Origin country :
AUVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
759d8edcb0fc7b6ed288d647cc6fdf9598d944b922654fae2e999d2f89407b3d.jar
Verdict:
No threats detected
Analysis date:
2024-05-09 07:28:33 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
lolbin remote
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.expl
Score:
72 / 100
Signature
Creates autostart registry keys to launch java
Exploit detected, runtime environment dropped PE file
Exploit detected, runtime environment starts unknown processes
Java Jar creates autostart registry key (Windows persistence behavior)
Sigma detected: Register Jar In Run Key
Sigma detected: Suspicious Processes Spawned by Java.EXE
Uses cmd line tools excessively to alter registry or file data
Behaviour
Behavior Graph:
Score:
73%
Verdict:
Malware
File Type:
ARCHIVE
Threat name:
Binary.Trojan.Generic
Status:
Suspicious
First seen:
2024-05-09 05:02:24 UTC
File Type:
Binary (Archive)
Extracted files:
1147
AV detection:
3 of 38 (7.89%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
7/10
Tags:
discovery persistence
Behaviour
Modifies registry key
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Adds Run key to start application
Loads dropped DLL
Modifies file permissions
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
12aa4b952044a8e06d33e7dfde07bcac940d035b70cfedea0c7eac0de6a5653d
jar 759d8edcb0fc7b6ed288d647cc6fdf9598d944b922654fae2e999d2f89407b3d
(this sample)
Dropped by
SHA256 12aa4b952044a8e06d33e7dfde07bcac940d035b70cfedea0c7eac0de6a5653d
Delivery method
Other
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.