MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8872e76ffc38017c1b3ef4b07756edb26c82cf45cceb8ed4d8c153c358fb5674. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 6
| SHA256 hash: | 8872e76ffc38017c1b3ef4b07756edb26c82cf45cceb8ed4d8c153c358fb5674 |
|---|---|
| SHA3-384 hash: | 063de358580814cbf94509deccf2d81baac6ae5869239951d188e7cfa9682dd775c521558c51d733a90039d1bfb3ab77 |
| SHA1 hash: | 6eb1406f3178fbb00133f802ae8c02513de28a09 |
| MD5 hash: | b0630729fac8d123b02f90c52017e8d8 |
| humanhash: | snake-carbon-bluebird-arizona |
| File name: | 近期骗子信息套路谨防上单.com |
| Download: | download sample |
| File size: | 733'552 bytes |
| First seen: | 2021-05-09 01:48:07 UTC |
| Last seen: | 2021-05-09 02:38:57 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | dac67ad15d498d52b875fafdd7113e11 |
| ssdeep | 12288:RULKPViLB87+nDS1hS0/ZxcJZYNyfI9vN+Q001i4zSqCUlRlhpNjRNFxKB/ba:RULKPDVNf9vN+Q001i4fpNjRPSba |
| Threatray | 63 similar samples on MalwareBazaar |
| TLSH | F9F49D31B881C033E5E210329AB99BB35D3DBD34572894DBA3D03BB85A345D37639B5A |
| Reporter | |
| Tags: | exe |
Intelligence
File Origin
# of uploads :
2
# of downloads :
141
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
近期骗子信息套路谨防上单.com
Verdict:
No threats detected
Analysis date:
2021-05-09 01:46:29 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Enabling the 'hidden' option for analyzed file
Sending a custom TCP request
DNS request
Sending a UDP request
Sending an HTTP GET request
Creating a file
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Deleting a recently created file
Launching a process
Launching a service
Creating a window
Moving a recently created file
Running batch commands
Searching for the window
Enabling autorun with the shell\open\command registry branches
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Multi AV Scanner detection for submitted file
Sigma detected: Execution from Suspicious Folder
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Tnega
Status:
Malicious
First seen:
2021-05-08 11:08:35 UTC
AV detection:
19 of 28 (67.86%)
Threat level:
5/5
Verdict:
unknown
Similar samples:
+ 53 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
9/10
Tags:
evasion
Behaviour
Modifies data under HKEY_USERS
Modifies registry class
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
Looks for VirtualBox Guest Additions in registry
Unpacked files
SH256 hash:
8872e76ffc38017c1b3ef4b07756edb26c82cf45cceb8ed4d8c153c358fb5674
MD5 hash:
b0630729fac8d123b02f90c52017e8d8
SHA1 hash:
6eb1406f3178fbb00133f802ae8c02513de28a09
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0001.025] Anti-Behavioral Analysis::Software Breakpoints
1) [B0009] Anti-Behavioral Analysis::Virtual Machine Detection
2) [B0012.001] Anti-Static Analysis::Argument Obfuscation
3) [B0030.002] Command and Control::Receive Data
4) [B0030.001] Command and Control::Send Data
5) [C0011.001] Communication Micro-objective::Resolve::DNS Communication
6) [C0002.014] Communication Micro-objective::Read Header::HTTP Communication
7) [C0003.003] Communication Micro-objective::Read Pipe::Interprocess Communication
8) [C0001.004] Communication Micro-objective::Connect Socket::Socket Communication
9) [C0001.011] Communication Micro-objective::Create TCP Socket::Socket Communication
10) [C0001.012] Communication Micro-objective::Get Socket Status::Socket Communication
11) [C0001.009] Communication Micro-objective::Initialize Winsock Library::Socket Communication
12) [C0001.006] Communication Micro-objective::Receive Data::Socket Communication
13) [C0001.007] Communication Micro-objective::Send Data::Socket Communication
14) [C0001.001] Communication Micro-objective::Set Socket Config::Socket Communication
15) [C0001.005] Communication Micro-objective::Start TCP Server::Socket Communication
16) [C0001.008] Communication Micro-objective::TCP Client::Socket Communication
17) [C0029] Cryptography Micro-objective::Cryptographic Hash
18) [C0031] Cryptography Micro-objective::Decrypt Data
19) [C0027.004] Cryptography Micro-objective::3DES::Encrypt Data
20) [C0027] Cryptography Micro-objective::Encrypt Data
21) [C0021.003] Cryptography Micro-objective::Use API::Generate Pseudo-random Sequence
22) [C0019] Data Micro-objective::Check String
23) [C0026.001] Data Micro-objective::Base64::Encode Data
24) [C0026.002] Data Micro-objective::XOR::Encode Data
27) [C0045] File System Micro-objective::Copy File
28) [C0046] File System Micro-objective::Create Directory
29) [C0047] File System Micro-objective::Delete File
30) [C0051] File System Micro-objective::Read File
31) [C0050] File System Micro-objective::Set File Attributes
32) [C0052] File System Micro-objective::Writes File
33) [C0034.001] Operating System Micro-objective::Set Variable::Environment Variable
34) [C0036.004] Operating System Micro-objective::Create Registry Key::Registry
35) [C0036.003] Operating System Micro-objective::Open Registry Key::Registry
36) [C0040] Process Micro-objective::Allocate Thread Local Storage
37) [C0017] Process Micro-objective::Create Process
38) [C0038] Process Micro-objective::Create Thread
39) [C0041] Process Micro-objective::Set Thread Local Storage Value
40) [C0018] Process Micro-objective::Terminate Process