MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7e2d96a16f1c04dd0906f90ba3a827b55e35dc616ea21a6dfbd3c596f47b22c3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



YoungLotus


Vendor detections: 14


Intelligence 14 IOCs YARA File information Comments

SHA256 hash: 7e2d96a16f1c04dd0906f90ba3a827b55e35dc616ea21a6dfbd3c596f47b22c3
SHA3-384 hash: 65ef4778b6f9a9a23008876d6a7fcc9c0c82cc0ffd77a6df4a9eb2d73fa469db7b5f75912da12e3b0886d9c206f94f1b
SHA1 hash: c8a313930ba09eafd7a5d36efa20fe36b0030651
MD5 hash: 01ca48b073743e7f525c3b5969009c46
humanhash: solar-indigo-july-beryllium
File name:点击此处安装简体中文飞机语言汉化包.exe
Download: download sample
Signature YoungLotus
File size:3'018'875 bytes
First seen:2022-05-16 13:00:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 92580736950a4e490c70c5c6a137f563 (1 x YoungLotus)
ssdeep 49152:XJ0X3jngai++GwmnJxMzNxxFiMw6DHWMZDXt:Z0HI+bnXMJN1FpXt
Threatray 16 similar samples on MalwareBazaar
TLSH T1A5D59F00E106E01ED57701BE4EBF721DB15DAF640305B6C7A28C3E6D5BBA8E1793A46E
TrID 38.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
20.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
13.0% (.EXE) Win64 Executable (generic) (10523/12/4)
8.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon 71b119dcce576333 (3'570 x Heodo, 203 x TrickBot, 19 x Gh0stRAT)
Reporter obfusor
Tags:exe Farfli RAT younglotus

Intelligence


File Origin
# of uploads :
1
# of downloads :
267
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
点击此处安装简体中文飞机语言汉化包.exe
Verdict:
Malicious activity
Analysis date:
2022-05-16 23:29:38 UTC
Tags:
trojan rat pcrat gh0st

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the %AppData% subdirectories
Creating a window
Changing a file
Searching for synchronization primitives
Launching a service
Sending a custom TCP request
Sending an HTTP POST request
DNS request
Searching for the window
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CursorPosition
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control.exe greyware keylogger overlay packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Young Lotus
Detection:
malicious
Classification:
troj
Score:
64 / 100
Signature
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Young Lotus
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Lotok
Status:
Malicious
First seen:
2022-05-16 13:01:06 UTC
File Type:
PE (Exe)
Extracted files:
20
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Result
Malware family:
gh0strat
Score:
  10/10
Tags:
family:gh0strat rat upx
Behaviour
Checks processor information in registry
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Enumerates connected drives
UPX packed file
Gh0st RAT payload
Gh0strat
Unpacked files
SH256 hash:
a26653c405eeec49150dc41fedce09a34cb96b4ff550a84968dafa37572bc8be
MD5 hash:
41e99a5cb7c9b401773cabafe2d54c80
SHA1 hash:
c82b20b24ef0c0746af0357a217463b751d5ae51
Detections:
win_younglotus_g0
SH256 hash:
7e2d96a16f1c04dd0906f90ba3a827b55e35dc616ea21a6dfbd3c596f47b22c3
MD5 hash:
01ca48b073743e7f525c3b5969009c46
SHA1 hash:
c8a313930ba09eafd7a5d36efa20fe36b0030651
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments