MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 860d73c3ab1f493aa2712d4d84e79139b99af1fd89764f1b61dc3cb604ce2e3c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ParallaxRAT


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 860d73c3ab1f493aa2712d4d84e79139b99af1fd89764f1b61dc3cb604ce2e3c
SHA3-384 hash: 36596057b7f91f577f54eb7603b4e69cfe436e43d4f620294672eb7868660882870dc827642d6badd6bbc9247c34d838
SHA1 hash: 5f65ffe546f27ba7fde853a068ecd47f4ecb1cea
MD5 hash: 08e8d3180f98a859fc0d05efe47f5b08
humanhash: yankee-leopard-mars-violet
File name:SOYKAL MID YEAR REQUEST 2020.rar
Download: download sample
Signature ParallaxRAT
File size:258'034 bytes
First seen:2020-07-10 09:23:54 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 6144:2stBfOU9OfJ7CaoqTwwpTFwCdRB2s/MYm2OqjlsK8xBpJS/vWY:2uoU9OfhGw5TyiRBZgGl12UvB
TLSH E944129F587A6DC20E250B82869D4B628917C40FE1C3FA87E52497E7B4400D3B2DF9B9
Reporter abuse_ch
Tags:nVpn ParallaxRAT rar RAT


Avatar
abuse_ch
Malspam distributing ParallaxRAT:

HELO: mix0.aubry-gaspard.org
Sending IP: 139.28.220.74
From: Burak Kocamaz <trade-dept@aubry-gaspard.org>
Reply-To: <import@soykal.org>
Subject: Attn: New MID YEAR Request Order Jul2020 TT 76HGT
Attachment: SOYKAL MID YEAR REQUEST 2020.rar (contains "SOYKAL MID YEAR REQUEST 202090404885554540000009004954.exe")

ParallaxRAT C2:
plunder.nsupdate.info:8888 (79.134.225.111)

Pointing to nVpn:

% Information related to '79.134.225.64 - 79.134.225.127'

% Abuse contact for '79.134.225.64 - 79.134.225.127' is 'abuse@your-vpn.network'

inetnum: 79.134.225.64 - 79.134.225.127
netname: YOUR_VPN_NETWORK
country: DE
remarks: ****************************************************
remarks: This subnet belongs to a VPN service provider.
remarks: We protect the right to privacy, which means
remarks: we don't log the activities of our users.
remarks: ****************************************************
admin-c: EH4074-RIPE
tech-c: YVN10-RIPE
status: ASSIGNED PA
abuse-c: YVN10-RIPE
org: ORG-YVN1-RIPE
mnt-by: AF15-MNT
created: 2019-07-19T18:26:38Z
last-modified: 2019-07-19T18:51:28Z
source: RIPE

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-07-10 09:25:05 UTC
AV detection:
15 of 29 (51.72%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

ParallaxRAT

rar 860d73c3ab1f493aa2712d4d84e79139b99af1fd89764f1b61dc3cb604ce2e3c

(this sample)

  
Dropping
ParallaxRAT
  
Delivery method
Distributed via e-mail attachment

Comments