MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 88e48bdaa7e112875198c1cc2db4a4d32e51e28d75f3ad9af7596859b4eccd24. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Adware.Neoreklami


Vendor detections: 14


Intelligence 14 IOCs YARA 3 File information Comments 1

SHA256 hash: 88e48bdaa7e112875198c1cc2db4a4d32e51e28d75f3ad9af7596859b4eccd24
SHA3-384 hash: e2c7fc7eca892c1eceed3831bd629215e21768ab2d0fcc6c8f7f2c34566bb06afccd897cac29727f0dfa8183773635af
SHA1 hash: 5c0a04ddd8cba58565d78bc9ed042938d91fb829
MD5 hash: 9565ebd1d5120f6ed3bb3f0be55ca67e
humanhash: video-colorado-october-cup
File name:9565ebd1d5120f6ed3bb3f0be55ca67e
Download: download sample
Signature Adware.Neoreklami
File size:7'587'176 bytes
First seen:2024-06-01 04:31:49 UTC
Last seen:2024-06-01 05:18:29 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 3786a4cf8bfee8b4821db03449141df4 (2'471 x Adware.Neoreklami, 2 x RedLineStealer, 2 x Adware.MultiPlug)
ssdeep 196608:91OJTXepL7GnZAZ0LzBqEWY5w9U5WSnzgTHtN8ZObtk0b7XQJJEYwffqV:3OtXepeZe0vUY5gUfC8ZOJEwffqV
TLSH T1A6763300BA92C0F7D320083567D8DBADF4BA96D54E31BE730385842E7EEDA9D876D491
TrID 37.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
20.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
12.7% (.EXE) Win64 Executable (generic) (10523/12/4)
7.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'462 x Adware.Neoreklami, 101 x RedLineStealer, 64 x N-able)
Reporter zbetcheckin
Tags:32 Adware.Neoreklami exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
375
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
88e48bdaa7e112875198c1cc2db4a4d32e51e28d75f3ad9af7596859b4eccd24.exe
Verdict:
Malicious activity
Analysis date:
2024-06-01 04:35:28 UTC
Tags:
adware neoreklami

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
Banker Encryption Network Tasker Dexter
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Launching a process
Launching cmd.exe command interpreter
Creating a file
Using the Windows Management Instrumentation requests
Replacing files
Launching a service
Creating a file in the Windows subdirectories
Searching for synchronization primitives
Sending a UDP request
Blocking the Windows Defender launch
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
epmicrosoft_visual_cc installer lolbin microsoft_visual_cc overlay packed sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
AI detected suspicious sample
Creates files in the recycle bin to hide itself
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies Group Policy settings
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Suspicious Scheduled Task Creation Involving Temp Folder
Snort IDS alert for network traffic
Suspicious powershell command line found
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1450336 Sample: A1CKAlootf.exe Startdate: 01/06/2024 Architecture: WINDOWS Score: 100 112 56.126.166.20.in-addr.arpa 2->112 120 Snort IDS alert for network traffic 2->120 122 Multi AV Scanner detection for dropped file 2->122 124 Multi AV Scanner detection for submitted file 2->124 126 7 other signatures 2->126 14 A1CKAlootf.exe 7 2->14         started        17 Install.exe 2->17         started        signatures3 process4 file5 106 C:\Users\user\AppData\Local\...\Install.exe, PE32 14->106 dropped 20 Install.exe 4 14->20         started        108 C:\Windows\Temp\...\fQxuzge.exe, PE32 17->108 dropped 110 C:\Windows\System32behaviorgraphroupPolicy\gpt.ini, ASCII 17->110 dropped 114 Creates files in the recycle bin to hide itself 17->114 116 Modifies Windows Defender protection settings 17->116 118 Modifies Group Policy settings 17->118 24 cmd.exe 17->24         started        signatures6 process7 file8 104 C:\Users\user\AppData\Local\...\Install.exe, PE32 20->104 dropped 132 Multi AV Scanner detection for dropped file 20->132 134 Machine Learning detection for dropped file 20->134 26 Install.exe 1 20->26         started        136 Modifies Windows Defender protection settings 24->136 29 forfiles.exe 24->29         started        31 forfiles.exe 24->31         started        33 forfiles.exe 24->33         started        35 3 other processes 24->35 signatures9 process10 signatures11 144 Multi AV Scanner detection for dropped file 26->144 146 Machine Learning detection for dropped file 26->146 148 Uses schtasks.exe or at.exe to add and modify task schedules 26->148 37 cmd.exe 1 26->37         started        40 forfiles.exe 1 26->40         started        42 forfiles.exe 26->42         started        44 schtasks.exe 26->44         started        150 Modifies Windows Defender protection settings 29->150 46 cmd.exe 29->46         started        48 cmd.exe 31->48         started        50 cmd.exe 33->50         started        52 cmd.exe 35->52         started        54 cmd.exe 35->54         started        process12 signatures13 138 Suspicious powershell command line found 37->138 140 Uses cmd line tools excessively to alter registry or file data 37->140 142 Modifies Windows Defender protection settings 37->142 68 6 other processes 37->68 71 2 other processes 40->71 73 2 other processes 42->73 56 conhost.exe 44->56         started        58 reg.exe 46->58         started        60 reg.exe 48->60         started        62 reg.exe 50->62         started        64 reg.exe 52->64         started        66 powershell.exe 54->66         started        process14 signatures15 128 Modifies Windows Defender protection settings 68->128 75 cmd.exe 1 68->75         started        78 cmd.exe 1 68->78         started        80 cmd.exe 1 68->80         started        86 2 other processes 68->86 130 Suspicious powershell command line found 71->130 82 powershell.exe 7 71->82         started        84 schtasks.exe 73->84         started        process16 signatures17 152 Suspicious powershell command line found 75->152 88 powershell.exe 12 75->88         started        154 Uses cmd line tools excessively to alter registry or file data 78->154 90 reg.exe 1 1 78->90         started        92 reg.exe 1 1 80->92         started        94 WMIC.exe 1 82->94         started        96 reg.exe 1 1 86->96         started        98 reg.exe 1 1 86->98         started        process18 process19 100 gpupdate.exe 1 88->100         started        process20 102 conhost.exe 100->102         started       
Threat name:
Win32.Trojan.Neoreblamy
Status:
Malicious
First seen:
2024-06-01 04:32:09 UTC
File Type:
PE (Exe)
Extracted files:
13
AV detection:
20 of 38 (52.63%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery evasion execution spyware stealer trojan
Behaviour
Creates scheduled task(s)
Enumerates system info in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Checks installed software on the system
Drops Chrome extension
Drops desktop.ini file(s)
Checks BIOS information in registry
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Modifies Windows Defender Real-time Protection settings
Windows security bypass
Unpacked files
SH256 hash:
f2cd21c2b0d38c16322866206714dc8aa2daff304388018123261ca7b7893f2b
MD5 hash:
b4b677ea75cb44d1858fd6b5d9c2ca0d
SHA1 hash:
3fa65e9bd188a1482dc223f3205e7fa94821e6c2
SH256 hash:
88e48bdaa7e112875198c1cc2db4a4d32e51e28d75f3ad9af7596859b4eccd24
MD5 hash:
9565ebd1d5120f6ed3bb3f0be55ca67e
SHA1 hash:
5c0a04ddd8cba58565d78bc9ed042938d91fb829
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:meth_get_eip
Author:Willi Ballenthin

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Adware.Neoreklami

Executable exe 88e48bdaa7e112875198c1cc2db4a4d32e51e28d75f3ad9af7596859b4eccd24

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteExA
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessA
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetCommandLineA
KERNEL32.dll::GetCommandLineW
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryA
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::CreateFileA
KERNEL32.dll::DeleteFileA
KERNEL32.dll::DeleteFileW

Comments



Avatar
zbet commented on 2024-06-01 04:31:50 UTC

url : hxxp://monoblocked.com/385115/setup.exe