MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 818879e025de0edf6dc27fc9df7b763bec9ebac29952e6dda015f05307349520. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
TVRat
Vendor detections: 7
| SHA256 hash: | 818879e025de0edf6dc27fc9df7b763bec9ebac29952e6dda015f05307349520 |
|---|---|
| SHA3-384 hash: | 6594c2eeab7a9648920c7a0f689ea523766fd2833737c60316248285c0a2f12badb701fb8644d0efa1547c2678a20ed5 |
| SHA1 hash: | 8a0cb0674c714520a2bfe361dbfb9344c946efd3 |
| MD5 hash: | 9601e4538b55b1dc2031ae9ffd05abff |
| humanhash: | robert-virginia-wyoming-mockingbird |
| File name: | SecuriteInfo.com.Trojan.Siggen10.31024.20148.16337 |
| Download: | download sample |
| Signature | TVRat |
| File size: | 5'027'950 bytes |
| First seen: | 2020-10-05 14:27:54 UTC |
| Last seen: | 2020-10-05 14:31:26 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 25890460a2b98652bed7ba240be2c1d7 (3 x TVRat, 1 x AsyncRAT, 1 x Socks5Systemz) |
| ssdeep | 98304:S5hUDsUlacXe6kxoIewFLlJIgoRTyIos6VAdVkMnwIYDa6KseyCUMXS:mhUDf0cXrkxoTu5Oos6+n3nJYZPMi |
| Threatray | 6 similar samples on MalwareBazaar |
| TLSH | F23633715A969064E4257BBC08641E657622AF430DC822DA37847F377BB32B3CDEB436 |
| Reporter | |
| Tags: | TVRat |
Intelligence
File Origin
# of uploads :
2
# of downloads :
131
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Moving a file to the %temp% subdirectory
Running batch commands
Creating a process with a hidden window
Launching a process
Creating a file in the %AppData% subdirectories
Deleting a recently created file
Enabling the 'hidden' option for recently created files
Modifying a system file
Using the Windows Management Instrumentation requests
Searching for the window
DNS request
Sending a custom TCP request
Sending a UDP request
Creating a file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Sending an HTTP GET request to an infection source
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.adwa.spyw.evad
Score:
84 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes the view of files in windows explorer (hidden files and folders)
Drops batch files with force delete cmd (self deletion)
Drops PE files to the startup folder
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Installs a global get message hook
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Uses known network protocols on non-standard ports
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Virus.TheRat
Status:
Malicious
First seen:
2020-10-01 05:07:09 UTC
AV detection:
19 of 29 (65.52%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
unknown
Similar samples:
Result
Malware family:
redline
Score:
10/10
Tags:
keylogger stealer spyware trojan family:agenttesla persistence discovery infostealer family:redline
Behaviour
Enumerates system info in registry
Kills process with taskkill
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
JavaScript code in executable
Looks up external IP address via web service
Checks computer location settings
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
AgentTesla Payload
AgentTesla
RedLine
Unpacked files
SH256 hash:
818879e025de0edf6dc27fc9df7b763bec9ebac29952e6dda015f05307349520
MD5 hash:
9601e4538b55b1dc2031ae9ffd05abff
SHA1 hash:
8a0cb0674c714520a2bfe361dbfb9344c946efd3
SH256 hash:
081d690c25253cb32b4806d1f052449f9b1dc4089dc1c29eda47af63cfb14dd8
MD5 hash:
1ae53109a8ae1595a3fd9935900fe13c
SHA1 hash:
4485609207e5f69eb7f513964912ca246bee7663
SH256 hash:
c9858b93578c8aa5c99c2ec50cff707a84e5617489338b18b3f91f782cbed695
MD5 hash:
2c1c2620c58a867d6b207735a41a097f
SHA1 hash:
2e412db22542c545d7babbce8c8637ea7e6bec7a
SH256 hash:
c48b76f9de397806b3c904d31e9468cef9c4b307934d208dbc3df196cac5794b
MD5 hash:
ffb4498978a94dd5098d0b082f481d71
SHA1 hash:
5fb255d4612ce60068913ab21c4fe7acc40649c0
SH256 hash:
6b820755f65861275b1e12db5c3a57a7cefdbcbcf8c05fb8ab17452b747b61cd
MD5 hash:
23e3e6d4b8822f6654ddfee388977bb3
SHA1 hash:
66887984e91a526f0889343f41d0116ccf430005
SH256 hash:
f42aeca29c8e6f3b6d9452627fb4b473568da8f5221af513962c88fda3f5640a
MD5 hash:
34202dc319b60b65b105d4e3fe14d835
SHA1 hash:
c25c83495ca064bc26c986acbf78dad4528f72e5
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Trojan
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.