MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7d8fcc05f835b1662600c57da1456afe6e10b842db6bb64b4ba8fe92d5e86a18. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 7d8fcc05f835b1662600c57da1456afe6e10b842db6bb64b4ba8fe92d5e86a18
SHA3-384 hash: 24b45100387c62dec0ee02675867a8eec9601465c03c46c235ad6cb9f81a0076c30473be74c3918142914a4407ae2987
SHA1 hash: 7219a8173ff9f8d81a73e9c77a6c1e5ca9417009
MD5 hash: 59881e136ccd99c126a50d43313ac2fa
humanhash: carolina-video-sixteen-saturn
File name:Счет 12418-21 от 30.12.2021.exe
Download: download sample
File size:247'576 bytes
First seen:2022-01-31 04:16:26 UTC
Last seen:2022-01-31 06:17:10 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9422d8f1b75bb5b0336087bbf87775ee (2 x ArkeiStealer, 1 x RedLineStealer, 1 x DarkWatchman)
ssdeep 3072:VTodjgdfdwkW30jfqg5XPXdXyYt3wILLnOtOjgTWW:VToJgtIq5XHjnOtOjgTN
Threatray 4'185 similar samples on MalwareBazaar
TLSH T19134C001B291D173C09A09B58532C6712B3EFC271C799B67768637AD5E313D36A3BB0A
File icon (PE):PE icon
dhash icon 74e4d4d6d4c4d4d4 (2 x DarkWatchman)
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
174
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Счет 12418-21 от 30.12.2021.exe
Verdict:
Malicious activity
Analysis date:
2022-01-31 04:19:36 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Sending an HTTP GET request
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a process with a hidden window
Running batch commands
Launching the default Windows debugger (dwwin.exe)
Using the Windows Management Instrumentation requests
Creating a file
Moving a file to the %temp% directory
Launching a process
Searching for the window
Сreating synchronization primitives
Query of malicious DNS domain
Sending a TCP request to an infection source
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
CPUID_Instruction
EvasionQueryPerformanceCounter
EvasionGetTickCount
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
72 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2022-01-31 02:44:08 UTC
File Type:
PE (Exe)
Extracted files:
8
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
ransomware spyware stealer
Behaviour
Interacts with shadow copies
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in System32 directory
Deletes itself
Reads user/profile data of web browsers
Blocklisted process makes network request
Deletes shadow copies
Process spawned unexpected child process
Unpacked files
SH256 hash:
a9ca34111c34b02fb19c1a6430f82661f9e2ce3f70a53daf97ed8952cc7602e5
MD5 hash:
d989606e2fea8bf338fd5e97dd8c7e3e
SHA1 hash:
8e40e161e01951c5791a617bad020e4933f253b3
SH256 hash:
7d8fcc05f835b1662600c57da1456afe6e10b842db6bb64b4ba8fe92d5e86a18
MD5 hash:
59881e136ccd99c126a50d43313ac2fa
SHA1 hash:
7219a8173ff9f8d81a73e9c77a6c1e5ca9417009
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe 7d8fcc05f835b1662600c57da1456afe6e10b842db6bb64b4ba8fe92d5e86a18

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments