MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7dda641f8a033f4428d6dc5a37b7c2e141b739683187d6f6a29c906693e85d36. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 7dda641f8a033f4428d6dc5a37b7c2e141b739683187d6f6a29c906693e85d36
SHA3-384 hash: a9fe6279da7ab9f8fdeda03416a5fb474ab37f077446e2a9a1c5b9fcf2641e18b50db3863ddc696a6c0b7dccbfd2d0bd
SHA1 hash: e3939a09572cfa486c3df6756653b7d339fd7f68
MD5 hash: 0e031a1c2cb857177e80d6370f1d228a
humanhash: cup-tennessee-delaware-table
File name:0e031a1c2cb857177e80d6370f1d228a.exe
Download: download sample
File size:162'816 bytes
First seen:2021-01-11 07:40:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f326f88ca83c9aacaa44acfb8884f1d4 (8 x RedLineStealer, 4 x DCRat, 2 x CoinMiner)
ssdeep 3072:muo1MlSEqhqJhJy0WTHW69B9VjMdxPedN9ug0/9TBf8mnh1sYsHUSLL7JszZG:m5oaqJhJMHW69B9VjMdxPedN9ug0/9TG
Threatray 4 similar samples on MalwareBazaar
TLSH 2FF37B56B2E01088DBF542FAD5921746EB7074761B10A3CB6BB853B71B2B4CA9F3C394
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
97
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0e031a1c2cb857177e80d6370f1d228a.exe
Verdict:
No threats detected
Analysis date:
2021-01-11 07:48:06 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Running batch commands
Using the Windows Management Instrumentation requests
Searching for the window
Launching a process
Sending a UDP request
Launching a tool to kill processes
Launching the process to interact with network services
Deleting of the original file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
76 / 100
Signature
Disables security and backup related services
Multi AV Scanner detection for submitted file
Sigma detected: Kill multiple process
Sigma detected: Stop multiple services
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Very long command line found
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 337874 Sample: kk2DznGyfM.exe Startdate: 11/01/2021 Architecture: WINDOWS Score: 76 52 Multi AV Scanner detection for submitted file 2->52 54 Sigma detected: Stop multiple services 2->54 56 Sigma detected: Kill multiple process 2->56 58 3 other signatures 2->58 9 kk2DznGyfM.exe 8 2->9         started        process3 file4 48 C:\Users\user\AppData\Local\Temp\...\8C20.bat, ASCII 9->48 dropped 12 cmd.exe 1 9->12         started        15 conhost.exe 9->15         started        process5 signatures6 60 Very long command line found 12->60 62 Disables security and backup related services 12->62 17 cmd.exe 1 12->17         started        19 cmd.exe 1 12->19         started        21 cmd.exe 1 12->21         started        23 7 other processes 12->23 process7 dnsIp8 26 taskkill.exe 1 17->26         started        28 taskkill.exe 1 17->28         started        38 4 other processes 17->38 30 net.exe 1 19->30         started        32 net.exe 1 19->32         started        34 conhost.exe 19->34         started        40 4 other processes 21->40 50 3.0.0.0 AMAZON-02US United States 23->50 36 taskkill.exe 1 23->36         started        42 11 other processes 23->42 process9 process10 44 net1.exe 1 30->44         started        46 net1.exe 32->46         started       
Threat name:
Win64.Trojan.Wacatac
Status:
Malicious
First seen:
2021-01-10 23:03:49 UTC
AV detection:
15 of 46 (32.61%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
evasion
Behaviour
Discovers systems in the same network
Kills process with taskkill
Runs net.exe
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Launches sc.exe
Modifies service settings
Stops running service(s)
Unpacked files
SH256 hash:
7dda641f8a033f4428d6dc5a37b7c2e141b739683187d6f6a29c906693e85d36
MD5 hash:
0e031a1c2cb857177e80d6370f1d228a
SHA1 hash:
e3939a09572cfa486c3df6756653b7d339fd7f68
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 7dda641f8a033f4428d6dc5a37b7c2e141b739683187d6f6a29c906693e85d36

(this sample)

  
Delivery method
Distributed via web download

Comments