MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8101d65f0f12946bd742b2b7513075ea485e3134258032252bef1938ac3cd3cd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CustomerLoader


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 8101d65f0f12946bd742b2b7513075ea485e3134258032252bef1938ac3cd3cd
SHA3-384 hash: c19e63fe922213f13569546c2d80835e3738c1488235d2b65d52b9e78914b3f973b9e64d0f22de1da4dab27718cd3c89
SHA1 hash: ad8e3405e58b4834c999d16a857c10f44f780119
MD5 hash: 4ac62a3dcf99f0ba33d2b4bd1bb70663
humanhash: venus-jupiter-october-johnny
File name:file
Download: download sample
Signature CustomerLoader
File size:40'448 bytes
First seen:2023-07-21 14:57:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 768:Isn/V7NFg/XeOhYYmu24Ra2DovIieNhIPVQPa4D/:/gveaj92m7ov0oWjD/
TLSH T15503CF0822ED01A3C6260F7EAE9802815BBB5B77F457EF6FEFC1114A1C537A89211B71
TrID 56.5% (.EXE) Win64 Executable (generic) (10523/12/4)
11.0% (.ICL) Windows Icons Library (generic) (2059/9)
10.9% (.EXE) OS/2 Executable (generic) (2029/13)
10.7% (.EXE) Generic Win/DOS Executable (2002/3)
10.7% (.EXE) DOS Executable Generic (2000/1)
Reporter jstrosch
Tags:.NET 85-217-144-143 CustomerLoader exe MSIL X64

Intelligence


File Origin
# of uploads :
1
# of downloads :
321
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-07-21 15:02:55 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
NetWalker Ransomware
Verdict:
Malicious
Result
Threat name:
Customer Loader
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Yara detected Costura Assembly Loader
Yara detected Customer Loader
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2023-07-20 21:56:45 UTC
File Type:
PE+ (.Net Exe)
Extracted files:
3
AV detection:
11 of 37 (29.73%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Unpacked files
SH256 hash:
8101d65f0f12946bd742b2b7513075ea485e3134258032252bef1938ac3cd3cd
MD5 hash:
4ac62a3dcf99f0ba33d2b4bd1bb70663
SHA1 hash:
ad8e3405e58b4834c999d16a857c10f44f780119
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CustomerLoader

Executable exe 8101d65f0f12946bd742b2b7513075ea485e3134258032252bef1938ac3cd3cd

(this sample)

  
Delivery method
Distributed via web download

Comments