MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7dfdcd5bc610f3718de9ecd3fc67aba996d3a9c786b5954832ede3cc99d0b0b7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 7dfdcd5bc610f3718de9ecd3fc67aba996d3a9c786b5954832ede3cc99d0b0b7
SHA3-384 hash: af273b9462cd15dfc04a255da06e70d1ffaa869650d99d79e6dde4891f53aea2641c797e2379cb508bb3fc6972805f03
SHA1 hash: e2f8374fae2dc206dc390c73c866567691385af9
MD5 hash: 88552621245e13e37456450b670b040e
humanhash: fanta-seven-sierra-sad
File name:Cyanide.exe
Download: download sample
File size:153'600 bytes
First seen:2021-02-13 11:07:01 UTC
Last seen:2021-02-13 12:58:37 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5877688b4859ffd051f6be3b8e0cd533 (119 x Babadeda, 2 x DCRat, 2 x RedLineStealer)
ssdeep 3072:Yq6+ouCpk2mpcWJ0r+QNTBf+y6DpUBmxMaf3h:Yldk1cWQRNTBGyvsxMK
Threatray 41 similar samples on MalwareBazaar
TLSH 3AE35BD0E2D5CAB7E7E1067000A5A13A66356E27D762D6D7930C398DE933BF05B382B4
Reporter Jirehlov
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
174
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Cyanide.exe
Verdict:
Malicious activity
Analysis date:
2021-02-13 08:47:33 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a file in the %AppData% directory
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Creating a process from a recently created file
Creating a file in the Windows subdirectories
Launching a service
Creating a window
Using the Windows Management Instrumentation requests
Sending a UDP request
Deleting volume shadow copies
Rewriting of the hard drive's master boot record
Forced shutdown of a browser
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
rans.evad
Score:
92 / 100
Signature
Contains functionality to access PhysicalDrive, possible boot sector overwrite
Contains functionality to infect the boot sector
Creates files inside the volume driver (system volume information)
Deletes shadow drive data (may be related to ransomware)
Deletes the backup plan of Windows
Drops batch files with force delete cmd (self deletion)
May disable shadow drive data (uses vssadmin)
Multi AV Scanner detection for submitted file
Sigma detected: WannaCry Ransomware
Uses bcdedit to modify the Windows boot settings
Writes directly to the primary disk partition (DR0)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 352723 Sample: Cyanide.exe Startdate: 13/02/2021 Architecture: WINDOWS Score: 92 57 Sigma detected: WannaCry Ransomware 2->57 59 Multi AV Scanner detection for submitted file 2->59 61 May disable shadow drive data (uses vssadmin) 2->61 63 3 other signatures 2->63 8 Cyanide.exe 16 2->8         started        12 wbengine.exe 3 2->12         started        14 vdsldr.exe 2->14         started        16 vds.exe 2->16         started        process3 file4 49 C:\Users\user\AppData\Roaming\MBR.exe, PE32 8->49 dropped 51 C:\Users\user\AppData\Local\Temp\...\7105.bat, ASCII 8->51 dropped 53 C:\Users\...\gdi_rectangle_down_no_limit.exe, PE32 8->53 dropped 55 5 other files (none is malicious) 8->55 dropped 79 Drops batch files with force delete cmd (self deletion) 8->79 18 cmd.exe 1 8->18         started        81 Creates files inside the volume driver (system volume information) 12->81 signatures5 process6 signatures7 65 May disable shadow drive data (uses vssadmin) 18->65 67 Deletes shadow drive data (may be related to ransomware) 18->67 69 Uses bcdedit to modify the Windows boot settings 18->69 71 Deletes the backup plan of Windows 18->71 21 MBR.exe 18->21         started        25 cmd.exe 1 18->25         started        27 cmd.exe 1 18->27         started        29 12 other processes 18->29 process8 file9 47 \Device\Harddisk0\DR0, DOS/MBR 21->47 dropped 73 Writes directly to the primary disk partition (DR0) 21->73 75 Contains functionality to access PhysicalDrive, possible boot sector overwrite 21->75 77 Contains functionality to infect the boot sector 21->77 31 cmd.exe 1 25->31         started        33 find.exe 1 25->33         started        35 cmd.exe 1 27->35         started        37 find.exe 1 27->37         started        39 cmd.exe 1 29->39         started        41 cmd.exe 1 29->41         started        43 cmd.exe 1 29->43         started        45 9 other processes 29->45 signatures10 process11
Threat name:
Win32.Trojan.KillMbr
Status:
Malicious
First seen:
2021-02-13 11:07:35 UTC
AV detection:
11 of 29 (37.93%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
bootkit discovery exploit persistence ransomware
Behaviour
Checks SCSI registry key(s)
Delays execution with timeout.exe
Interacts with shadow copies
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Modifies boot configuration data using bcdedit
Writes to the Master Boot Record (MBR)
Modifies file permissions
Deletes backup catalog
Executes dropped EXE
Possible privilege escalation attempt
Deletes shadow copies
Unpacked files
SH256 hash:
02b6699383a3090714a1e1eeead7dfd998f4d2ac308027f01d5d9e0c5136730c
MD5 hash:
e4d673f7c307c957449a00913f9359db
SHA1 hash:
cd6f693a5276fefcc621d7af4a90ba451d3bbc6b
SH256 hash:
7dfdcd5bc610f3718de9ecd3fc67aba996d3a9c786b5954832ede3cc99d0b0b7
MD5 hash:
88552621245e13e37456450b670b040e
SHA1 hash:
e2f8374fae2dc206dc390c73c866567691385af9
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments