MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7c3ac84e096ca5f2bbb36520dac302bfa00b6cd61598eafbffeaabea66bfa307. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PoshC2


Vendor detections: 13


Intelligence 13 IOCs YARA 10 File information Comments 1

SHA256 hash: 7c3ac84e096ca5f2bbb36520dac302bfa00b6cd61598eafbffeaabea66bfa307
SHA3-384 hash: 3b699fce1bd1f7ad0c9c50ab04f243dbefe14a80150f854a1ca350f65e2519c81aff4c913acfeee02e107fe0c404e614
SHA1 hash: 2d7efc8dfbb0672d9e14fae3fdc38a634abebeb9
MD5 hash: 5976bcd5e7f558b6aed4e84ce4b0eeb5
humanhash: west-utah-mississippi-cold
File name:5976bcd5e7f558b6aed4e84ce4b0eeb5
Download: download sample
Signature PoshC2
File size:225'979 bytes
First seen:2023-12-04 19:52:25 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash bb9dc484d891a7cf70c5c51b76b5d7db (7 x PoshC2)
ssdeep 3072:GppR5Ootvzcj+M+xVf/iMFO0uQaz2RKmoT2t+YTq5RNvw:Gh5jlYIxVfBtRGTO+2q5RNI
Threatray 4 similar samples on MalwareBazaar
TLSH T1B0247CB1B6C1DCB3DA6E1A3958F587281F3CF6838B828F172F24553A1F621C0EE55946
TrID 32.2% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
20.5% (.EXE) Win64 Executable (generic) (10523/12/4)
12.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
9.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter zbetcheckin
Tags:32 exe poshc2

Intelligence


File Origin
# of uploads :
1
# of downloads :
326
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Sending a custom TCP request
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug anti-vm lolbin obfuscated overlay rundll32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
84 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject threads in other processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected Generic Downloader
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2023-12-04 19:53:39 UTC
File Type:
PE (Exe)
AV detection:
21 of 23 (91.30%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:poshc2 dropper trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
PoshC2
PoshC2 binary
Unpacked files
SH256 hash:
3edb773e4dd653c165b54f9727524625a85b6d59e48a6b50c8e2a35948e499ff
MD5 hash:
7cb5b2e693a846336c39c2a90d7da99d
SHA1 hash:
7f71fb74e9298de23f373a2dd3dcc4c26aa41ae6
SH256 hash:
246b4900c111a3604d96efa85a6d291fbc524ff76972b835039c6c1af74b2fa5
MD5 hash:
67ab437368a089ac74f37d79528d381f
SHA1 hash:
6d0738967bea2dc4c9c30c7cfd203cfe1b952597
Detections:
Gen_Base64_EXE
SH256 hash:
7c3ac84e096ca5f2bbb36520dac302bfa00b6cd61598eafbffeaabea66bfa307
MD5 hash:
5976bcd5e7f558b6aed4e84ce4b0eeb5
SHA1 hash:
2d7efc8dfbb0672d9e14fae3fdc38a634abebeb9
Detections:
Gen_Base64_EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:meth_peb_parsing
Author:Willi Ballenthin
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:Windows_Shellcode_Rdi_eee75d2c
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PoshC2

Executable exe 7c3ac84e096ca5f2bbb36520dac302bfa00b6cd61598eafbffeaabea66bfa307

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-12-04 19:52:26 UTC

url : hxxp://139.59.72.48:8000/Sharp_v4_dropper_x86.exe