MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 79629ab0850f3dd1f61b13a3fd69570425faca6b15a4b453b9a2e0834ee9728e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 14


Intelligence 14 IOCs YARA 6 File information Comments

SHA256 hash: 79629ab0850f3dd1f61b13a3fd69570425faca6b15a4b453b9a2e0834ee9728e
SHA3-384 hash: 80a2fe2310a690ccea03add9139751caadc909963a196a2152fc3c06dd679d5be897333a90a56e6f26b09974c4a08139
SHA1 hash: eed0865613144eba454454d91a2b92fc2717c068
MD5 hash: f5bd4bbc494017262a22785e5b53f316
humanhash: grey-nevada-cola-cat
File name:f5bd4bbc494017262a22785e5b53f316.exe
Download: download sample
File size:1'694'720 bytes
First seen:2024-12-10 06:11:16 UTC
Last seen:2024-12-18 10:38:49 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c5f00a6fe8c8d189216e47cc0bff8748
ssdeep 49152:zic0Ug34MNv4Kwu3zuSTQP76NuudqxdeY1wn8mZ:DFcbTQP76Nuudqxan
TLSH T10C759D56B3E401F8E1A7C138C9574A1BE7B2B855036097DF03A486662F23BE16F3E761
TrID 70.8% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
12.9% (.EXE) Win64 Executable (generic) (10522/11/4)
6.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
2.5% (.ICL) Windows Icons Library (generic) (2059/9)
2.4% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
367
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
F99E6584C274E6814B81BE68C0F2EE47.exe
Verdict:
Malicious activity
Analysis date:
2024-11-30 10:13:55 UTC
Tags:
loader smokeloader stealer stealc amadey botnet github themida lumma

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
virus smtp sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Running batch commands
Creating a process with a hidden window
Launching a process
Creating a process from a recently created file
Connection attempt
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Moving a recently created file
Creating a window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Adding an exclusion to Microsoft Defender
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
cmd fingerprint lolbin microsoft_visual_cc remote
Result
Verdict:
MALICIOUS
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates a Windows Service pointing to an executable in C:\Windows
Drops executables to the windows directory (C:\Windows) and starts them
Found API chain indicative of debugger detection
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Self deletion via cmd or bat file
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious New Service Creation
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: TrustedPath UAC Bypass Pattern
Suspicious command line found
Suspicious powershell command line found
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Powershell decode and execute
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1572166 Sample: dYUteuvmHn.exe Startdate: 10/12/2024 Architecture: WINDOWS Score: 100 144 rootunvbot.com 2->144 146 raw.githubusercontent.com 2->146 148 2 other IPs or domains 2->148 166 Malicious sample detected (through community Yara rule) 2->166 168 Antivirus detection for URL or domain 2->168 170 Antivirus detection for dropped file 2->170 172 15 other signatures 2->172 12 curlapp64.exe 1 2->12         started        15 svchost.exe 2->15         started        19 dYUteuvmHn.exe 3 2->19         started        21 2 other processes 2->21 signatures3 process4 dnsIp5 136 C:\Windows \System32\printui.dll (copy), PE32+ 12->136 dropped 23 cmd.exe 2 12->23         started        38 3 other processes 12->38 156 rootunvbot.com 188.116.21.204 NEPHAX-ASPL Poland 15->156 158 ipinfo.io 34.117.59.81 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 15->158 160 Found API chain indicative of debugger detection 15->160 162 Adds a directory exclusion to Windows Defender 15->162 26 cmd.exe 15->26         started        28 cmd.exe 15->28         started        30 cmd.exe 15->30         started        32 cmd.exe 15->32         started        138 C:\Users\user\Desktop\zlib1.dll, PE32+ 19->138 dropped 140 C:\Users\user\Desktop\libcurl.dll, PE32+ 19->140 dropped 142 C:\Users\user\Desktop\curlapp64.exe, PE32+ 19->142 dropped 164 Self deletion via cmd or bat file 19->164 34 cmd.exe 1 19->34         started        36 cmd.exe 1 19->36         started        40 4 other processes 21->40 file6 signatures7 process8 signatures9 174 Drops executables to the windows directory (C:\Windows) and starts them 23->174 42 4 other processes 23->42 46 2 other processes 26->46 48 2 other processes 28->48 50 2 other processes 30->50 52 2 other processes 32->52 176 Suspicious powershell command line found 34->176 178 Uses schtasks.exe or at.exe to add and modify task schedules 34->178 180 Adds a directory exclusion to Windows Defender 34->180 54 2 other processes 34->54 57 2 other processes 36->57 59 4 other processes 38->59 61 6 other processes 40->61 process10 dnsIp11 124 C:\Windows\System32\zlib1.dll, PE32+ 42->124 dropped 126 C:\Windows\System32\x610437.dat, PE32+ 42->126 dropped 128 C:\Windows\System32\ucrtbased.dll, PE32+ 42->128 dropped 134 11 other files (9 malicious) 42->134 dropped 184 Adds a directory exclusion to Windows Defender 42->184 186 Suspicious command line found 42->186 63 cmd.exe 42->63         started        66 cmd.exe 1 42->66         started        68 cmd.exe 42->68         started        74 4 other processes 42->74 188 Loading BitLocker PowerShell Module 52->188 150 github.com 20.233.83.145, 443, 49706, 49712 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 54->150 152 raw.githubusercontent.com 185.199.109.133, 443, 49715, 49720 FASTLYUS Netherlands 54->152 154 127.0.0.1 unknown unknown 54->154 130 C:\Users\user\Desktop\prnttemp.dll, PE32+ 54->130 dropped 132 C:\Windows \System32\printui.exe, PE32+ 54->132 dropped 190 Multi AV Scanner detection for dropped file 54->190 192 Machine Learning detection for dropped file 54->192 70 cmd.exe 1 54->70         started        72 cmd.exe 4 54->72         started        file12 signatures13 process14 signatures15 204 Drops executables to the windows directory (C:\Windows) and starts them 63->204 76 bav64.exe 63->76         started        79 conhost.exe 63->79         started        206 Suspicious powershell command line found 66->206 81 powershell.exe 23 66->81         started        83 conhost.exe 66->83         started        85 console_zero.exe 68->85         started        87 conhost.exe 68->87         started        91 2 other processes 70->91 89 conhost.exe 72->89         started        208 Adds a directory exclusion to Windows Defender 74->208 93 10 other processes 74->93 process16 signatures17 194 Multi AV Scanner detection for dropped file 76->194 196 Machine Learning detection for dropped file 76->196 95 cmd.exe 76->95         started        97 cmd.exe 76->97         started        99 cmd.exe 76->99         started        103 6 other processes 76->103 198 Found suspicious powershell code related to unpacking or dynamic code loading 81->198 200 Loading BitLocker PowerShell Module 81->200 101 cmd.exe 85->101         started        202 Creates a Windows Service pointing to an executable in C:\Windows 93->202 process18 process19 105 powershell.exe 95->105         started        108 powershell.exe 97->108         started        110 powershell.exe 99->110         started        112 conhost.exe 101->112         started        114 schtasks.exe 101->114         started        116 powershell.exe 103->116         started        118 powershell.exe 103->118         started        120 powershell.exe 103->120         started        122 2 other processes 103->122 signatures20 182 Loading BitLocker PowerShell Module 105->182
Threat name:
Win64.Trojan.Amadey
Status:
Malicious
First seen:
2024-11-06 06:25:22 UTC
File Type:
PE+ (Exe)
Extracted files:
7
AV detection:
24 of 38 (63.16%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution persistence
Behaviour
Delays execution with timeout.exe
Modifies data under HKEY_USERS
Modifies registry key
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Embeds OpenSSL
Launches sc.exe
Drops file in System32 directory
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Deletes itself
Executes dropped EXE
Loads dropped DLL
Creates new service(s)
Downloads MZ/PE file
Server Software Component: Terminal Services DLL
Command and Scripting Interpreter: PowerShell
Unpacked files
SH256 hash:
13a8862be683ad1298c8e60692c274b9f62c454a26a11841031d53f2b90bedcc
MD5 hash:
990dcc08d59b375a75dd575701dd2aa4
SHA1 hash:
637af1af09157095d5c0005fe272e46857f861e6
SH256 hash:
7e9f43688189578042d791e3e5301165316edc7c1ed739e0669c033a3ca08037
MD5 hash:
f53d1efea4855da42da07de49d80ba68
SHA1 hash:
920349f4bd5a5b8e77195c81e261dfa2177eb1ee
SH256 hash:
79629ab0850f3dd1f61b13a3fd69570425faca6b15a4b453b9a2e0834ee9728e
MD5 hash:
f5bd4bbc494017262a22785e5b53f316
SHA1 hash:
eed0865613144eba454454d91a2b92fc2717c068
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:RansomPyShield_Antiransomware
Author:XiAnzheng
Description:Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP)
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:skip20_sqllang_hook
Author:Mathieu Tartare <mathieu.tartare@eset.com>
Description:YARA rule to detect if a sqllang.dll version is targeted by skip-2.0. Each byte pattern corresponds to a function hooked by skip-2.0. If $1_0 or $1_1 match, it is probably targeted as it corresponds to the hook responsible for bypassing the authentication.
Reference:https://www.welivesecurity.com/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 79629ab0850f3dd1f61b13a3fd69570425faca6b15a4b453b9a2e0834ee9728e

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
KERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineA
KERNEL32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleOutputCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileW

Comments