MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 826fb62aa2659c50864af07f2cd840e15310043a138f8ced0872e7d9a9fcdb4b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemoteManipulator


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 826fb62aa2659c50864af07f2cd840e15310043a138f8ced0872e7d9a9fcdb4b
SHA3-384 hash: bc6739cfc3b09cc1470d489ea5c123981d4fda0d5c5b688d0b26f16d5b6278a7423bfebb97a61d96143e45d675dd245e
SHA1 hash: 3cb7433270021523ba475614aaff2b11b638a4ab
MD5 hash: f8f0c283f2c06f87b5657a75bb272942
humanhash: lion-black-magnesium-maine
File name:f8f0c283f2c06f87b5657a75bb272942.exe
Download: download sample
Signature RemoteManipulator
File size:1'631'044 bytes
First seen:2021-02-21 18:16:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e2a1496c94d52a035fe47259ee6587b7 (5 x RemoteManipulator, 2 x CoinMiner, 1 x WSHRAT)
ssdeep 49152:LUclPhp9vH1VjR6bpB+wdsgKhyZf6ENdzcxE1TnB3j:11ybCg4yZSENdzfTnBz
Threatray 9 similar samples on MalwareBazaar
TLSH DA75F11DB3A451E4E9B36138CF91D636E7727C010B21C39F22E54E4B3FAB2D64929B61
Reporter abuse_ch
Tags:exe RemoteManipulator

Intelligence


File Origin
# of uploads :
1
# of downloads :
162
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
826fb62aa2659c50864af07f2cd840e15310043a138f8ced0872e7d9a9fcdb4b.exe
Verdict:
No threats detected
Analysis date:
2021-02-21 22:02:55 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Searching for the window
Creating a file in the %temp% subdirectories
Deleting a recently created file
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
evad
Score:
26 / 100
Signature
Creates files in alternative data streams (ADS)
Behaviour
Behavior Graph:
Threat name:
Win64.Malware.Bulz
Status:
Malicious
First seen:
2021-02-21 18:17:13 UTC
AV detection:
8 of 47 (17.02%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
NTFS ADS
Suspicious behavior: GetForegroundWindowSpam
Unpacked files
SH256 hash:
826fb62aa2659c50864af07f2cd840e15310043a138f8ced0872e7d9a9fcdb4b
MD5 hash:
f8f0c283f2c06f87b5657a75bb272942
SHA1 hash:
3cb7433270021523ba475614aaff2b11b638a4ab
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemoteManipulator

Executable exe 826fb62aa2659c50864af07f2cd840e15310043a138f8ced0872e7d9a9fcdb4b

(this sample)

  
Delivery method
Distributed via web download

Comments