MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 866bbfed0984202d487c557e4617c3b3372101031782748cc6a8cbf4c162cfc8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 866bbfed0984202d487c557e4617c3b3372101031782748cc6a8cbf4c162cfc8
SHA3-384 hash: eaf22f74c3c8c04accec1d4c7d0e76affcc9b940b32d97d91619243963707355049c7d1560ae4285830a7cc2f4807d5b
SHA1 hash: 61cd4d3d9d1e990ccce6fc0b512f0b826c9142d5
MD5 hash: 66324491b9b8336452f7eb03828ba330
humanhash: enemy-emma-lima-william
File name:866bbfed0984202d487c557e4617c3b3372101031782748cc6a8cbf4c162cfc8
Download: download sample
File size:559'928 bytes
First seen:2020-11-07 22:28:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c581e778ba559d8e6a1073ed4b145b6f (87 x Adware.Breitschopp)
ssdeep 12288:0om+ZEgnMCkSQiC6iZr3nRfQK28cly6KEUZlMkc9A7Z25:0mnYSQi1iR3nV28clyfEUZl9nlc
Threatray 37 similar samples on MalwareBazaar
TLSH 24C48D2BB291E277D46308B25F9BA33704759736A52DD502B3542E1FEA703E0AB2435F
Reporter seifreed

Intelligence


File Origin
# of uploads :
1
# of downloads :
117
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a file
Creating a window
DNS request
Connecting to a non-recommended domain
Sending an HTTP POST request
Sending an HTTP GET request
Moving a recently created file
Searching for the window
Changing a file
Threat name:
Win32.PUA.DownloadGuide
Status:
Malicious
First seen:
2020-11-07 22:38:24 UTC
AV detection:
22 of 28 (78.57%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Modifies Internet Explorer settings
Suspicious use of SetWindowsHookEx
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments