MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7a9938273e502427d127d1aced6f9fe7fd25c7fdffe5319788f1e0588280734b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 7a9938273e502427d127d1aced6f9fe7fd25c7fdffe5319788f1e0588280734b
SHA3-384 hash: 2165a657142b6cc7df6e173fb0c109e82452529e25738a7694e56b09420381a2c08f3c9f184fbd482974ca55dd9f9c2a
SHA1 hash: cb72217bfbc8ab6699290a060051b7abb2890871
MD5 hash: 0293aa6ac5145fe595571629e13051b8
humanhash: monkey-kilo-hot-xray
File name:990109.exe
Download: download sample
File size:159'136 bytes
First seen:2020-12-26 17:54:26 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash be1921ef36a8b52236171dd3cb086a92
ssdeep 3072:tNxAh5V+rA14HPLO8vGWLvmUt1QBnKA+kzhCAHCMyvNLo:o5VoD+aMnDnhCuV2E
Threatray 4 similar samples on MalwareBazaar
TLSH 52F35A0B9994BCABFA87C57F6C64CE9A3908ED61A704E8580FDD44C045A36B3C2E757C
Reporter Anonymous
Tags:Ursnif

Code Signing Certificate

Organisation:Symantec Time Stamping Services CA - G2
Issuer:Thawte Timestamping CA
Algorithm:sha1WithRSAEncryption
Valid from:Dec 21 00:00:00 2012 GMT
Valid to:Dec 30 23:59:59 2020 GMT
Serial number: 7E93EBFB7CC64E59EA4B9A77D406FC3B
Intelligence: 85 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 0625FEE1A80D7B897A9712249C2F55FF391D6661DBD8B87F9BE6F252D88CED95
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
387
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
21684750.exe
Verdict:
Malicious activity
Analysis date:
2020-12-04 06:46:30 UTC
Tags:
trojan sinkhole

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% subdirectories
Creating a file
Enabling the 'hidden' option for recently created files
DNS request
Sending an HTTP POST request
Launching a process
Deleting a recently created file
Sending a custom TCP request
Sending a UDP request
Connection attempt
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Sending an HTTP POST request to an infection source
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
HTMLPhisher
Detection:
malicious
Classification:
spre.phis.troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Send many emails (e-Mail Spam)
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to download HTTP data from a sinkholed server
Tries to resolve many domain names, but no domain seems valid
Writes to foreign memory regions
Yara detected HtmlPhish_10
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 334172 Sample: 990109.exe Startdate: 26/12/2020 Architecture: WINDOWS Score: 100 53 199.59.242.153 BODIS-NJUS United States 2->53 55 zupraha.cz 2->55 57 460 other IPs or domains 2->57 87 Tries to download HTTP data from a sinkholed server 2->87 89 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->89 91 Multi AV Scanner detection for submitted file 2->91 93 6 other signatures 2->93 8 990109.exe 3 68 2->8         started        13 tibqanobatib.exe 2->13         started        15 tibqanobatib.exe 2->15         started        signatures3 process4 dnsIp5 59 93.187.206.66 NETDIREKT-ASTR Turkey 8->59 61 210.140.73.39 IDCFIDCFrontierIncJP Japan 8->61 67 185 other IPs or domains 8->67 43 C:\Users\...\tibqanobatib.exe:Zone.Identifier, ASCII 8->43 dropped 45 C:\Users\user\tibqanobatib.exe, MS-DOS 8->45 dropped 95 Drops PE files to the user root directory 8->95 97 Writes to foreign memory regions 8->97 99 Allocates memory in foreign processes 8->99 17 svchost.exe 8->17         started        63 www.tyrns.com 13->63 65 xinhui.net 13->65 69 53 other IPs or domains 13->69 101 Multi AV Scanner detection for dropped file 13->101 103 Machine Learning detection for dropped file 13->103 105 Injects a PE file into a foreign processes 13->105 21 svchost.exe 13->21         started        23 svchost.exe 15->23         started        file6 signatures7 process8 dnsIp9 47 akr.co.id 17->47 49 stopllc.com 17->49 51 10 other IPs or domains 17->51 85 Injects a PE file into a foreign processes 17->85 25 svchost.exe 12 17->25         started        29 svchost.exe 12 17->29         started        31 svchost.exe 12 17->31         started        41 5 other processes 17->41 33 svchost.exe 21->33         started        35 svchost.exe 21->35         started        37 svchost.exe 21->37         started        39 svchost.exe 21->39         started        signatures10 process11 dnsIp12 77 117 other IPs or domains 25->77 107 System process connects to network (likely due to code injection or exploit) 25->107 71 150.242.140.16 WEBWERKS-AS-INWebWerksIndiaPvtLtdIN India 29->71 79 116 other IPs or domains 29->79 81 139 other IPs or domains 31->81 73 ftmobile.com 199.34.228.78 WEEBLYUS United States 41->73 75 162.217.99.134 VOXEL-DOT-NETUS United States 41->75 83 77 other IPs or domains 41->83 signatures13
Threat name:
Win32.Trojan.Cutwail
Status:
Malicious
First seen:
2020-12-02 23:34:51 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
persistence upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
UPX packed file
ServiceHost packer
Unpacked files
SH256 hash:
7a9938273e502427d127d1aced6f9fe7fd25c7fdffe5319788f1e0588280734b
MD5 hash:
0293aa6ac5145fe595571629e13051b8
SHA1 hash:
cb72217bfbc8ab6699290a060051b7abb2890871
SH256 hash:
2667c1ba9a3c1f4b69b0adc75c2ce242373823927b3e5c94d5cb670274c28c93
MD5 hash:
8dbe23493c7ca72a67185942a642a211
SHA1 hash:
aab74fa20f0c9b641755cfc45d3c3df62928b78c
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments