MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 866aa6561a85c6adfae9a51ecbbcec4f9a00cf04dc8798d0b1cc23bfb6483f41. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 2 File information Comments

SHA256 hash: 866aa6561a85c6adfae9a51ecbbcec4f9a00cf04dc8798d0b1cc23bfb6483f41
SHA3-384 hash: 9cd56473ac88e4fb9afc0ee84ae1c3da16bbb23a1ec609b620f911316419db151ccfdd0db7543d4be41900e9b74ee1e5
SHA1 hash: cee57ac856fa5c91441a8c4b3ffa7e1e22d18f11
MD5 hash: 0a83d5ad4a668d87f23318b404cac4b0
humanhash: uranus-london-fanta-idaho
File name:0a83d5ad4a668d87f23318b404cac4b0.exe
Download: download sample
File size:6'124'144 bytes
First seen:2023-02-13 15:14:26 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ba5546933531fafa869b1f86a4e2a959 (10 x DCRat, 3 x RedLineStealer, 2 x RemcosRAT)
ssdeep 98304:ujWjD1azb71QGQCPDbZfzuOqV6lORkBMjq86uUTWcCVU9Lvek5DIiLw:ujo6dQmRrdA6lakaqdVT8UF2yDIa
TLSH T110563382B180C8E1E96E8138C49209F9D761BC22C366E60B17E4BE673F772E15D37756
TrID 48.7% (.EXE) Win64 Executable (generic) (10523/12/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon 169e0f4d492d1b0f
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
195
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0a83d5ad4a668d87f23318b404cac4b0.exe
Verdict:
Malicious activity
Analysis date:
2023-02-13 15:17:37 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Running batch commands
Launching a process
Creating a window
DNS request
Сreating synchronization primitives
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 806352 Sample: hzNAB2Gpbj.exe Startdate: 13/02/2023 Architecture: WINDOWS Score: 56 30 Snort IDS alert for network traffic 2->30 32 Multi AV Scanner detection for submitted file 2->32 8 hzNAB2Gpbj.exe 15 2->8         started        process3 file4 20 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 8->20 dropped 22 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 8->22 dropped 24 C:\Users\user\AppData\Local\...\python310.dll, PE32+ 8->24 dropped 26 9 other files (none is malicious) 8->26 dropped 11 hzNAB2Gpbj.exe 1 8->11         started        13 conhost.exe 8->13         started        process5 process6 15 cmd.exe 1 11->15         started        process7 17 mshta.exe 14 15->17         started        dnsIp8 28 panelco.su 176.9.78.52, 51633 HETZNER-ASDE Germany 17->28
Threat name:
Win64.Trojan.Casdet
Status:
Malicious
First seen:
2023-02-13 04:57:42 UTC
File Type:
PE+ (Exe)
Extracted files:
290
AV detection:
3 of 26 (11.54%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
pyinstaller
Behaviour
Suspicious use of WriteProcessMemory
Loads dropped DLL
Blocklisted process makes network request
Malware Config
Dropper Extraction:
https://panelco.su:51633/dOxjNfICvLyitMSP/bfQdFEyuDzetnPxm.html#tDYyKxCQd5SJpAmg3M9cosZjOInrkRu8l1heFEbiB7v4VP0azGHU6LTq2NfXWw+/=
Unpacked files
SH256 hash:
866aa6561a85c6adfae9a51ecbbcec4f9a00cf04dc8798d0b1cc23bfb6483f41
MD5 hash:
0a83d5ad4a668d87f23318b404cac4b0
SHA1 hash:
cee57ac856fa5c91441a8c4b3ffa7e1e22d18f11
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:PyInstaller
Author:@bartblaze
Description:Identifies executable converted using PyInstaller.
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 866aa6561a85c6adfae9a51ecbbcec4f9a00cf04dc8798d0b1cc23bfb6483f41

(this sample)

  
Delivery method
Distributed via web download

Comments