MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7834064fa52947aad9d3d1d2734ce629a1c03a08df215cc5963c00e13a7fc50d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Babadeda


Vendor detections: 13


Intelligence 13 IOCs YARA 4 File information Comments

SHA256 hash: 7834064fa52947aad9d3d1d2734ce629a1c03a08df215cc5963c00e13a7fc50d
SHA3-384 hash: dd673e7c05fd09bb1848ef82e596dda986f626674ff9535381e86801ffd6674d397b0e1201281f522153073ee6f0c041
SHA1 hash: 7ebe146b3a5ecfab2534593abd73105830513d06
MD5 hash: 3a6d832ff60f0064fc09f0f317244db6
humanhash: indigo-wolfram-don-single
File name:SecuriteInfo.com.Win32.AdwareX-gen.23904.22648
Download: download sample
Signature Babadeda
File size:8'250'578 bytes
First seen:2024-01-25 16:34:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 63d926bab4649641f492888f61234125 (4 x Babadeda)
ssdeep 196608:1OdpUoylpCC+cXT7iFCan6Vn9v9LLDA7mZ3gDuqL7fd0r:1OdwTeIc6VnfLEM3gpLpA
TLSH T1C3863339D29D2208C98F113506A12A429737EEAD617BCD3705A926C440FEFDA92DFD4F
TrID 58.5% (.EXE) UPX compressed Win32 Executable (27066/9/6)
14.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
9.7% (.EXE) Win32 Executable (generic) (4505/5/1)
4.4% (.EXE) Win16/32 Executable Delphi generic (2072/23)
4.3% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 2e2e5630adc9ce48 (12 x Babadeda)
Reporter SecuriteInfoCom
Tags:Babadeda exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
318
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Delayed reading of the file
Creating a process from a recently created file
Running batch commands
Launching a process
Searching for the window
Creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
fingerprint hook keylogger overlay packed packed packed quasar rat redcap stealer upx
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
suspicious
Classification:
evad
Score:
32 / 100
Signature
Contains functionality to detect sleep reduction / modifications
Found API chain indicative of debugger detection
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1381213 Sample: SecuriteInfo.com.Win32.Adwa... Startdate: 25/01/2024 Architecture: WINDOWS Score: 32 41 Multi AV Scanner detection for dropped file 2->41 43 Multi AV Scanner detection for submitted file 2->43 45 Found API chain indicative of debugger detection 2->45 47 Contains functionality to detect sleep reduction / modifications 2->47 8 SecuriteInfo.com.Win32.AdwareX-gen.23904.22648.exe 44 61 2->8         started        process3 file4 33 C:\Users\user\AppData\...\IconRemoval.exe, PE32 8->33 dropped 35 C:\Users\user\...\CleanUp Icons FOP.exe, PE32 8->35 dropped 37 C:\Users\user\AppData\...\7zipFOPBACKEND.exe, PE32 8->37 dropped 39 8 other malicious files 8->39 dropped 11 CleanUp Icons FOP.exe 4 8->11         started        13 IconRemoval.exe 1 1 8->13         started        15 7zipFOPBACKEND.exe 8->15         started        process5 process6 17 cmd.exe 1 11->17         started        19 cmd.exe 1 11->19         started        21 cmd.exe 1 11->21         started        25 10 other processes 11->25 23 conhost.exe 13->23         started        process7 27 mode.com 1 17->27         started        29 attrib.exe 1 19->29         started        31 cmd.exe 1 21->31         started       
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2024-01-25 16:35:07 UTC
File Type:
PE (Exe)
Extracted files:
396
AV detection:
14 of 38 (36.84%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
kinsing
Score:
  10/10
Tags:
family:kinsing loader upx
Behaviour
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Enumerates physical storage devices
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
UPX packed file
Kinsing
Unpacked files
SH256 hash:
c762ff15e9bde7fda8ffc3ded096d7af01afbc5ba43de4863e8cd0129e176b78
MD5 hash:
2962a819bc0503ed5c55cc1951dac0f7
SHA1 hash:
49a0c3c16db8f47a16092a9f3bb012d5be69a62b
SH256 hash:
d20b1f008cc63caca4896c7c18a29f99dfac3d438b32fd26ade664fa8430fb41
MD5 hash:
088fe2295e01739348b6d51190f1cf42
SHA1 hash:
ba37f34d09afa4fed7a1ab817265bd339a29bd00
Detections:
SUSP_BAT2EXE_BDargo_Converted_BAT
SH256 hash:
8a05c6fb79b07c99af406d3a084fe0db6a8664cde9bf034e499e71c81422ce02
MD5 hash:
8dc8b9bc6ba7d44f34e72d1ad1cd0ee1
SHA1 hash:
520727afb5bbb90046d8ecb252f56ec6a6bebd84
SH256 hash:
7a13d4867a4e14b73d915d938b9d406ebde7764ade6a0ed00e950065c8d22020
MD5 hash:
14577f43157de78fb1772e1abfa52c73
SHA1 hash:
bc83432006c7058bd281dcdfe5d5a4516e31b28c
SH256 hash:
5d6e217ed7d9053fd1d69214cffc0e958b843a14e7608fe57472fc46fabb4398
MD5 hash:
9c26bc460296e66ec38e1ce240a6111d
SHA1 hash:
dce5ec160bb986c1ab5cbb4309a90f6735104b6b
SH256 hash:
7834064fa52947aad9d3d1d2734ce629a1c03a08df215cc5963c00e13a7fc50d
MD5 hash:
3a6d832ff60f0064fc09f0f317244db6
SHA1 hash:
7ebe146b3a5ecfab2534593abd73105830513d06
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:NET
Author:malware-lu
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Babadeda

Executable exe 7834064fa52947aad9d3d1d2734ce629a1c03a08df215cc5963c00e13a7fc50d

(this sample)

  
Delivery method
Distributed via web download

Comments