MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8300461fa790545afed415e391f96ab3f324538044e099935c34c033ad2286dd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stop
Vendor detections: 14
| SHA256 hash: | 8300461fa790545afed415e391f96ab3f324538044e099935c34c033ad2286dd |
|---|---|
| SHA3-384 hash: | 1381873ebda3c46eb62b36cfb5008b2838994bb96d8bf8297153e065a275a2da102f237a7abab2223717190a6c9f0055 |
| SHA1 hash: | 96df57ed66000a46ec0c6d651ea6c526651a9186 |
| MD5 hash: | 442c61aef040337274a561695df8bdbb |
| humanhash: | twenty-july-oxygen-freddie |
| File name: | 442c61aef040337274a561695df8bdbb.exe |
| Download: | download sample |
| Signature | Stop |
| File size: | 801'792 bytes |
| First seen: | 2022-05-08 17:05:36 UTC |
| Last seen: | 2022-05-08 17:37:34 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 5e927159b39478b740427a8589931b0b (1 x RedLineStealer, 1 x Stop) |
| ssdeep | 12288:s5GB1Ntn3sFZsy8Hdzgdw14YLE42nnHWFY8oq+q1/4Ycy:tXt3U8edEmZnn2FYnqn |
| Threatray | 1'228 similar samples on MalwareBazaar |
| TLSH | T14B050210EA90E035F5F712F0997987A8B92E7EA19B2480CB61E937EE53346D4EC31357 |
| TrID | 39.4% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9) 29.5% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 9.9% (.EXE) Win64 Executable (generic) (10523/12/4) 6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.7% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| File icon (PE): | |
| dhash icon | badacaaecee6baa6 (16 x Stop, 10 x RedLineStealer, 8 x Smoke Loader) |
| Reporter | |
| Tags: | exe Stop |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://ugll.org/fhsgtsspen6/get.php | https://threatfox.abuse.ch/ioc/548952/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
https://t.me/hollandracing
https://busshi.moe/@ronxik321
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries and memory artifcats referencing sandbox DLLs typically observed in sandbox evasion |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing SQL queries to confidential data stores. Observed in infostealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing potential Windows Defender anti-emulation checks |
| Rule name: | MALWARE_Win_STOP |
|---|---|
| Author: | ditekSHen |
| Description: | Detects STOP ransomware |
| Rule name: | MALWARE_Win_Vidar |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Vidar / ArkeiStealer |
| Rule name: | SUSP_XORed_URL_in_EXE |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | SUSP_XORed_URL_in_EXE_RID2E46 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | Vidar |
|---|---|
| Author: | kevoreilly |
| Description: | Vidar Payload |
| Rule name: | win_stop_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.stop. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.