MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 79566bb3c1421220ae07285c74add2c31f5bb79c91cd5c7cea90e98edbe13c34. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 79566bb3c1421220ae07285c74add2c31f5bb79c91cd5c7cea90e98edbe13c34
SHA3-384 hash: 56cbad2272c3b5281e872c42371c6eecaf6785b3f6d9675a7edff9145e2152cf02f43447e9d6c3141e95648e8ff1cf05
SHA1 hash: a92789b5fcc9802a910ba3973ebcb26e1273c809
MD5 hash: c03b2b8302fd9c5ca1bf10aeebe506c8
humanhash: fish-beryllium-beer-dakota
File name:c03b2b8302fd9c5ca1bf10aeebe506c8.exe
Download: download sample
File size:1'168'021 bytes
First seen:2021-12-16 09:22:24 UTC
Last seen:2021-12-16 11:17:52 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5094bd6be83536db48f1eec7300c4330 (1 x RedLineStealer)
ssdeep 6144:PerZbU7CP5hDeK1GoFpiTB4iSP2Re8J2xiSP2Re8J2xiSP2Re8J2xiSP2Re8J2:m5U7CPHik7piTBFk8k8k8k
Threatray 32 similar samples on MalwareBazaar
TLSH T106459F319561E01BD98741F6FBAF8AACE44E5C40874811D76A38A9BB01391F0EEF7E47
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
130
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Unauthorized injection to a recently created process
Launching a process
Creating a process with a hidden window
DNS request
Using the Windows Management Instrumentation requests
Сreating synchronization primitives
Sending an HTTP POST request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug greyware overlay
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
68 / 100
Signature
Bypasses PowerShell execution policy
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Injects a PE file into a foreign processes
Behaviour
Behavior Graph:
behaviorgraph top1 process2 2 Behavior Graph ID: 540880 Sample: wWLjDhQD3D.exe Startdate: 16/12/2021 Architecture: WINDOWS Score: 68 7 wWLjDhQD3D.exe 2->7         started        signatures3 19 Detected unpacking (changes PE section rights) 7->19 21 Detected unpacking (overwrites its own PE header) 7->21 23 Bypasses PowerShell execution policy 7->23 25 2 other signatures 7->25 10 wWLjDhQD3D.exe 2 7->10         started        process4 process5 12 powershell.exe 15 20 10->12         started        dnsIp6 17 45.77.127.230, 8888 AS-CHOOPAUS United States 12->17 15 conhost.exe 12->15         started        process7
Threat name:
Win32.Trojan.ClipBanker
Status:
Malicious
First seen:
2021-12-16 09:23:10 UTC
File Type:
PE (Exe)
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Blocklisted process makes network request
Malware Config
Dropper Extraction:
http://45.77.127.230:8888
Unpacked files
SH256 hash:
f98086eee6a14399294f7e720fa2daea803b2e7a7215301b613486dc09861122
MD5 hash:
e77224e78c7332461fa475c368bd3024
SHA1 hash:
71aa9920cdd83e3746bd61249f4bae0ae708a317
SH256 hash:
79566bb3c1421220ae07285c74add2c31f5bb79c91cd5c7cea90e98edbe13c34
MD5 hash:
c03b2b8302fd9c5ca1bf10aeebe506c8
SHA1 hash:
a92789b5fcc9802a910ba3973ebcb26e1273c809
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:WIN32_MALWR_DROPPER_INJECTOR_RANSOMWARE
Author:Jesper Mikkelsen
Description:Detect Suspicous dropper injector - possible ransomware dropper
Reference:SHA-1:0feda1e7b0d4506270c85973826fa498e9ed0f5b

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 79566bb3c1421220ae07285c74add2c31f5bb79c91cd5c7cea90e98edbe13c34

(this sample)

  
Delivery method
Distributed via web download

Comments