MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 7c02890decef71660dfe21a565fb508d7428092390976a964617cd50d672003b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
YoungLotus
Vendor detections: 12
| SHA256 hash: | 7c02890decef71660dfe21a565fb508d7428092390976a964617cd50d672003b |
|---|---|
| SHA3-384 hash: | 6fb0aaf4b260fdf0428b0202a2e1c13cceb1e000a4036e769f9b05472cc2f6ab534fed8a39c38dba234d55b61745a425 |
| SHA1 hash: | 2c21b7524e1c0201c7e9f56856c2bda4c48c7f1e |
| MD5 hash: | 14ef6b95a76d5086ad4052650c0c5f46 |
| humanhash: | video-don-mississippi-georgia |
| File name: | ExamOnline.exe |
| Download: | download sample |
| Signature | YoungLotus |
| File size: | 167'936 bytes |
| First seen: | 2022-06-03 06:09:31 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | bf8a8c0c406406a043a10747db1c71ea (1 x YoungLotus) |
| ssdeep | 1536:GEsr24VO3tQtFClmPHNoKhvLLtObH9jSqHwtasRAxCMUKCTn56YATxkxP8ZSa6Tl:YrJiQtFymPtteLoPawAfeYTChTHepOH |
| Threatray | 29 similar samples on MalwareBazaar |
| TLSH | T125F37B26F5CFBCB5F1055E30086D2779D270E96C8B028FF79798DE6E649E180E92A10D |
| TrID | 38.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 20.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 13.0% (.EXE) Win64 Executable (generic) (10523/12/4) 8.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 6.2% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| File icon (PE): | |
| dhash icon | 71b119dcce576333 (3'570 x Heodo, 203 x TrickBot, 19 x Gh0stRAT) |
| Reporter | |
| Tags: | exe Gh0stRAT RAT younglotus |
Intelligence
File Origin
# of uploads :
1
# of downloads :
353
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
pcrat
ID:
1
File name:
ExamOnline.exe
Verdict:
Malicious activity
Analysis date:
2022-06-03 06:11:48 UTC
Tags:
trojan rat pcrat gh0st
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Launching a process
Сreating synchronization primitives
DNS request
Creating a file in the %AppData% subdirectories
Searching for the window
Changing a file
Launching a service
Sending a custom TCP request
Sending an HTTP POST request
Searching for synchronization primitives
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
shell32.dll update.exe
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Young Lotus
Detection:
malicious
Classification:
bank.troj.evad
Score:
84 / 100
Signature
Antivirus / Scanner detection for submitted sample
Checks if browser processes are running
Found evasive API chain (may stop execution after checking mutex)
Found stalling execution ending in API Sleep call
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Young Lotus
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Zegost
Status:
Malicious
First seen:
2022-06-03 06:10:07 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
22 of 26 (84.62%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 19 additional samples on MalwareBazaar
Result
Malware family:
gh0strat
Score:
10/10
Tags:
family:gh0strat rat upx
Behaviour
Checks processor information in registry
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Enumerates connected drives
UPX packed file
Gh0st RAT payload
Gh0strat
Unpacked files
SH256 hash:
a26653c405eeec49150dc41fedce09a34cb96b4ff550a84968dafa37572bc8be
MD5 hash:
41e99a5cb7c9b401773cabafe2d54c80
SHA1 hash:
c82b20b24ef0c0746af0357a217463b751d5ae51
Detections:
win_younglotus_g0
Parent samples :
5e5f8efd6ced3f58cc5212b0f68a8badb9419b87a99fa1683ecc2f49e5103c1d
2addf0687e15d5da150548c7dd1d27bd3138b8ed464e0fe8cc6d091e34842ed3
bda9ac7c976d4077921a53b7b178aa402254d9e1e81a3eb7a5cc462982df9f0e
1876e6fe34192e24fcb2245199c99a6735a6424151044564506b14bd670e1f91
695dbd8c8d80719168bb3987b62fa5348f480ce00f4afbe54efae3a647fc2552
97a6d37991a271facf6254ac7e4f4072bb3718cdc01c2fc8d92e3953a3f8b453
1ae94a167f7ef76891fda0551c8306cb5834e9e89bca30c8a72921d376e0d3e1
04a7caa6cb7a45a1251f28f4ad9479e78f0fed395851c97729d30cc0490062e3
0e4c2040ee56cf81df3334e99fb2e419e9ed81a3c9d47bd8f57bb8a95a927baa
38590535738c42247dc06b18dc9bf011859942183a2de27e2f0fa2400bfa38d8
5fc335f79202263e7e68942ffc5f14d705db9caf44c09255ba142f5489a28155
3b2d63085e9da6b031fac137cc960379d46c895a0af0c75b7934c5057ed638cd
ac003329806ad003d7db1b36782431b0dce1aeca52cd9234983e8e1f78971164
252283a77c47a726452e660a27e434048a2020b8b7ff473164546d2f0d42d6db
e6c357c2c7c70b4630dbdcd86df2d98ed28cbd47a9efcbf727fe0fdbc5d5fefa
7e2d96a16f1c04dd0906f90ba3a827b55e35dc616ea21a6dfbd3c596f47b22c3
0a7efe1575204e7d7060acaf97370d560c72c30e5c3c57523d53fe35e2730e9e
7c02890decef71660dfe21a565fb508d7428092390976a964617cd50d672003b
32ed59ce4299490ce95d293f6304b1932873091fc0a3ec4db3052a89214245a7
37110e2a1293cd0ca22acee8dc6f21fc3de998ecf7f184b24c100428cffbb8ed
dacf404f18ed74e385ac6e44d264222ce138a16de81e6c1e9a45c3016c63588b
2addf0687e15d5da150548c7dd1d27bd3138b8ed464e0fe8cc6d091e34842ed3
bda9ac7c976d4077921a53b7b178aa402254d9e1e81a3eb7a5cc462982df9f0e
1876e6fe34192e24fcb2245199c99a6735a6424151044564506b14bd670e1f91
695dbd8c8d80719168bb3987b62fa5348f480ce00f4afbe54efae3a647fc2552
97a6d37991a271facf6254ac7e4f4072bb3718cdc01c2fc8d92e3953a3f8b453
1ae94a167f7ef76891fda0551c8306cb5834e9e89bca30c8a72921d376e0d3e1
04a7caa6cb7a45a1251f28f4ad9479e78f0fed395851c97729d30cc0490062e3
0e4c2040ee56cf81df3334e99fb2e419e9ed81a3c9d47bd8f57bb8a95a927baa
38590535738c42247dc06b18dc9bf011859942183a2de27e2f0fa2400bfa38d8
5fc335f79202263e7e68942ffc5f14d705db9caf44c09255ba142f5489a28155
3b2d63085e9da6b031fac137cc960379d46c895a0af0c75b7934c5057ed638cd
ac003329806ad003d7db1b36782431b0dce1aeca52cd9234983e8e1f78971164
252283a77c47a726452e660a27e434048a2020b8b7ff473164546d2f0d42d6db
e6c357c2c7c70b4630dbdcd86df2d98ed28cbd47a9efcbf727fe0fdbc5d5fefa
7e2d96a16f1c04dd0906f90ba3a827b55e35dc616ea21a6dfbd3c596f47b22c3
0a7efe1575204e7d7060acaf97370d560c72c30e5c3c57523d53fe35e2730e9e
7c02890decef71660dfe21a565fb508d7428092390976a964617cd50d672003b
32ed59ce4299490ce95d293f6304b1932873091fc0a3ec4db3052a89214245a7
37110e2a1293cd0ca22acee8dc6f21fc3de998ecf7f184b24c100428cffbb8ed
dacf404f18ed74e385ac6e44d264222ce138a16de81e6c1e9a45c3016c63588b
SH256 hash:
7c02890decef71660dfe21a565fb508d7428092390976a964617cd50d672003b
MD5 hash:
14ef6b95a76d5086ad4052650c0c5f46
SHA1 hash:
2c21b7524e1c0201c7e9f56856c2bda4c48c7f1e
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.25
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.