MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 849a3e76731c918716b6014d8a8d4863996d45eddc5b13b16420ebb106b3cd28. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stop
Vendor detections: 10
| SHA256 hash: | 849a3e76731c918716b6014d8a8d4863996d45eddc5b13b16420ebb106b3cd28 |
|---|---|
| SHA3-384 hash: | d6f325c64ec5a038894da2520788102ba1519f33da4f50b1360fbabd4b068a60e841e64af8d4c5e454572bfb3f2c222e |
| SHA1 hash: | ee82333487eb6b6dc9c56630d3a631303c0b1784 |
| MD5 hash: | 6c246ce24c1cec788a85d6d1be05efa3 |
| humanhash: | dakota-saturn-lima-foxtrot |
| File name: | 6c246ce24c1cec788a85d6d1be05efa3.exe |
| Download: | download sample |
| Signature | Stop |
| File size: | 854'528 bytes |
| First seen: | 2021-06-14 08:15:35 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f3b31e907320cadf5820c6eb76eca851 (3 x Stop, 2 x RedLineStealer, 1 x TeamBot) |
| ssdeep | 24576:BFt2ZAOfNGC9IQ/0EkUSA27Y1pAxM+d95PG+x0fE:Bf2rkC9cE6AaY1pAZbNG+ |
| TLSH | 8F0502006291C0F4F0F716F96A7A9F39A9ED7EB0A76864DF53C526DA16386D0AC30317 |
| Reporter | |
| Tags: | exe Stop |
Intelligence
File Origin
# of uploads :
1
# of downloads :
131
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
6c246ce24c1cec788a85d6d1be05efa3.exe
Verdict:
Suspicious activity
Analysis date:
2021-06-14 08:42:46 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Sending a custom TCP request
Sending a UDP request
Creating a window
Unauthorized injection to a recently created process
DNS request
Creating a file
Launching a process
Creating a process with a hidden window
Adding an access-denied ACE
Deleting a recently created file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
STOP Ransomware
Verdict:
Malicious
Result
Threat name:
Djvu
Detection:
malicious
Classification:
rans.evad
Score:
100 / 100
Signature
Contains functionality to inject code into remote processes
Detected unpacking (overwrites its own PE header)
Found ransom note / readme
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Djvu Ransomware
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.Stop
Status:
Malicious
First seen:
2021-06-13 00:33:10 UTC
AV detection:
15 of 29 (51.72%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
7/10
Tags:
discovery persistence
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Modifies file permissions
Unpacked files
SH256 hash:
022c9a691cafb9ad7eb0a6f4b97d6c81fbadc27e8b3198959fffe04345371856
MD5 hash:
fbbd55cb4df5457aba487c1e529f6cc2
SHA1 hash:
2b6edeeae445edcfb457238de99295918e782372
Detections:
win_stop_auto
Parent samples :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 hash:
849a3e76731c918716b6014d8a8d4863996d45eddc5b13b16420ebb106b3cd28
MD5 hash:
6c246ce24c1cec788a85d6d1be05efa3
SHA1 hash:
ee82333487eb6b6dc9c56630d3a631303c0b1784
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.