MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7ba6ab30eb71e8ab3ccdc734633391c092b25160f62173d4b6237da6c55b5a24. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LgoogLoader


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 7ba6ab30eb71e8ab3ccdc734633391c092b25160f62173d4b6237da6c55b5a24
SHA3-384 hash: 75b31a639bd2f8685923f158e65cba77e1b70e7aee868e0f3ee732c9c94f872872dab5a0fa9da5f3708bfd449393bfb0
SHA1 hash: 3ba5c566299ba91072f41cffa8894a237bcff71d
MD5 hash: 788f396393dcab0c3dee93fbd2ae8371
humanhash: november-alaska-idaho-pennsylvania
File name:file
Download: download sample
Signature LgoogLoader
File size:46'080 bytes
First seen:2023-06-08 17:04:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 768:RjFq7GFIOtbLrPg2Eln1eL2HLMGTay0CE5qb4rafyFZ:xF3b/PZEV1eL2rhTarefyFZ
TLSH T1D0235C0136A88A42C2FE437565B24140A3FDEA769B26C34E3DD754DE9EF33A64702B53
TrID 44.4% (.EXE) Win64 Executable (generic) (10523/12/4)
21.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.ICL) Windows Icons Library (generic) (2059/9)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter jstrosch
Tags:.NET exe LgoogLoader MSIL X64

Intelligence


File Origin
# of uploads :
1
# of downloads :
363
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-06-08 17:06:02 UTC
Tags:
opendir

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the %temp% directory
Creating a service
Loading a system driver
Launching a process
Creating a file
Enabling autorun for a service
Forced shutdown of a system process
Sending an HTTP GET request to an infection source
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
lolbin
Verdict:
Malicious
Labled as:
MSIL/Kryptik_AGeneric.AWC trojan
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
lgoogLoader
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Contain functionality to detect virtual machines
Contains functionality to infect the boot sector
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sample is not signed and drops a device driver
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected lgoogLoader
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Adware.RedCap
Status:
Malicious
First seen:
2023-06-08 15:46:56 UTC
File Type:
PE+ (.Net Exe)
Extracted files:
6
AV detection:
20 of 36 (55.56%)
Threat level:
  1/5
Result
Malware family:
lgoogloader
Score:
  10/10
Tags:
family:lgoogloader downloader persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Sets service image path in registry
Detects LgoogLoader payload
LgoogLoader
Unpacked files
SH256 hash:
7ba6ab30eb71e8ab3ccdc734633391c092b25160f62173d4b6237da6c55b5a24
MD5 hash:
788f396393dcab0c3dee93fbd2ae8371
SHA1 hash:
3ba5c566299ba91072f41cffa8894a237bcff71d
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LgoogLoader

Executable exe 7ba6ab30eb71e8ab3ccdc734633391c092b25160f62173d4b6237da6c55b5a24

(this sample)

  
Delivery method
Distributed via web download

Comments