MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7cfe6b3d43caf0e6d990caf7b778d9c68e8e95f9ea6a44f9fefb46be5476c083. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Foudre


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 7cfe6b3d43caf0e6d990caf7b778d9c68e8e95f9ea6a44f9fefb46be5476c083
SHA3-384 hash: 5efcecb655e420f9399fdb545fe1899b26b1d274b3fc516475bbbed6be74068c324bccf6bafd531a6ae8e1523b4de912
SHA1 hash: 9adffd9ce105a3fa934184b859b73126aa8e48b4
MD5 hash: 16adbfb16dd14a5aa74c1f56545643c3
humanhash: football-one-fruit-nineteen
File name:7cfe6b3d43caf0e6d990caf7b778d9c68e8e95f9ea6a44f9fefb46be5476c083.bin
Download: download sample
Signature Foudre
File size:7'419'840 bytes
First seen:2021-07-30 21:19:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3c98c11017e670673be70ad841ea9c37 (5 x HawkEye, 5 x NanoCore, 4 x Plugx)
ssdeep 196608:lF91LnWflYhwPyT58NqxC3VhwxZlsE0YSjjGFB7fTwtA:vjLneahSqDxQVh6kE0YSjUkA
Threatray 652 similar samples on MalwareBazaar
TLSH T1B8763345B6C4A177DA62D63E699FA21EBDB08C2A107DD407FB004C6A7F79342DF11A83
dhash icon f0e0d0d8e4e8e0e0 (1 x Foudre)
Reporter Arkbird_SOLG
Tags:apt exe Foudre

Intelligence


File Origin
# of uploads :
1
# of downloads :
605
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
7cfe6b3d43caf0e6d990caf7b778d9c68e8e95f9ea6a44f9fefb46be5476c083.bin
Verdict:
Malicious activity
Analysis date:
2021-07-30 21:22:42 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
72 / 100
Signature
Machine Learning detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Tries to resolve many domain names, but no domain seems valid
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Foudre
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 457126 Sample: s2mecz6Lvg.bin Startdate: 30/07/2021 Architecture: WINDOWS Score: 72 33 ffad9c36.space 2->33 35 ff4a241b.space 2->35 37 301 other IPs or domains 2->37 47 Multi AV Scanner detection for submitted file 2->47 49 Yara detected Foudre 2->49 51 Performs DNS queries to domains with low reputation 2->51 53 Machine Learning detection for dropped file 2->53 9 s2mecz6Lvg.exe 12 2->9         started        12 Video.UI.exe 57 48 2->12         started        signatures3 55 Tries to resolve many domain names, but no domain seems valid 35->55 process4 dnsIp5 25 C:\Users\user\AppData\Local\Temp\...\d697, PE32 9->25 dropped 27 C:\Users\user\AppData\Local\...\conf6829.dll, PE32 9->27 dropped 15 rundll32.exe 1 2 9->15         started        39 settings-ssl.xboxlive.com 12->39 41 ffad9c36.688.org 12->41 43 fc8cace3.688.org 12->43 file6 process7 file8 29 C:\Users\user\AppData\Local\...\sduchxll.tmp, XML 15->29 dropped 31 C:\ProgramData\DeviceCredential.dll (copy), PE32 15->31 dropped 18 cmd.exe 1 15->18         started        process9 signatures10 45 Uses schtasks.exe or at.exe to add and modify task schedules 18->45 21 conhost.exe 18->21         started        23 schtasks.exe 1 18->23         started        process11
Threat name:
Win32.Trojan.Delf
Status:
Malicious
First seen:
2021-06-19 00:43:28 UTC
AV detection:
15 of 29 (51.72%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Creates scheduled task(s)
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Loads dropped DLL
Unpacked files
SH256 hash:
7cfe6b3d43caf0e6d990caf7b778d9c68e8e95f9ea6a44f9fefb46be5476c083
MD5 hash:
16adbfb16dd14a5aa74c1f56545643c3
SHA1 hash:
9adffd9ce105a3fa934184b859b73126aa8e48b4
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments