MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7891ae9d0d99198c2fa2e77bb5f937b22ffa4ffa83c6fbba6a012b7054b4b1b9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 7891ae9d0d99198c2fa2e77bb5f937b22ffa4ffa83c6fbba6a012b7054b4b1b9
SHA3-384 hash: 7dc82fdb6fab39a0b2a1b846ff82499b6ef6f1a02243134a2903545668ffe533ca8a6088643a284b2c0b6deeb88bf2f4
SHA1 hash: 4539865ea44ded6f5493a5a17e0b118ede027cb1
MD5 hash: 374090dd4787607038e3f71543cd25d9
humanhash: tennessee-table-indigo-table
File name:PRICE with SHORTEST DELIVERY TIME.exe
Download: download sample
File size:795'136 bytes
First seen:2020-10-14 15:10:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'650 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger)
ssdeep 12288:Cu8esCAolKnmf0PoSh7/zcAIgJnbfVnPzvRxSlvGVTEYE:1sCAAKnmsZh7rcAIyVPzLDBEF
Threatray 11 similar samples on MalwareBazaar
TLSH C7058C122E78AF64E07D43369468093397F8EDD69321C56ABDEA3CDE64BCF589211703
Reporter abuse_ch
Tags:exe


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: fritzhansen.com
Sending IP: 185.222.57.73
From: SERGIO | Sales Manager <info@fritzhansen.com>
Subject: PRICE with SHORTEST DELIVERY TIME
Attachment: PRICE with SHORTEST DELIVERY TIME______r00.rar (contains "PRICE with SHORTEST DELIVERY TIME.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
65
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Launching a process
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
60 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Spyware.Stelega
Status:
Malicious
First seen:
2020-10-14 00:50:09 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Unpacked files
SH256 hash:
7891ae9d0d99198c2fa2e77bb5f937b22ffa4ffa83c6fbba6a012b7054b4b1b9
MD5 hash:
374090dd4787607038e3f71543cd25d9
SHA1 hash:
4539865ea44ded6f5493a5a17e0b118ede027cb1
SH256 hash:
01dd844990e0c5fdcea0f88712253aa1ef4750316f0734ab7099306170b5ea2a
MD5 hash:
eb593633270aa19162cf64663df9dd6c
SHA1 hash:
2ec57181471ff10abe9a04239ca3ea86ea4252b9
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe 7891ae9d0d99198c2fa2e77bb5f937b22ffa4ffa83c6fbba6a012b7054b4b1b9

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments