MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 894b34af3325dde22dc87ed9a084ece98a0c4df986bcb6b8847c56ad2a134146. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Adware.Generic


Vendor detections: 7


Intelligence 7 IOCs YARA 4 File information Comments

SHA256 hash: 894b34af3325dde22dc87ed9a084ece98a0c4df986bcb6b8847c56ad2a134146
SHA3-384 hash: f2fa24acf0780a6fa03d2eae97bd5ab346fe96eb2a553dbe051f9551697c49a354f795fbabbfe3d2ce07ca299fa9a4f2
SHA1 hash: a533e5109b9e43f5d98bdf563170e0c157a85ea0
MD5 hash: 3e39dd501b69359ef829ee7a2f347b0f
humanhash: kentucky-india-apart-eleven
File name:SecuriteInfo.com.Program.Unwanted.5387.16902.11969
Download: download sample
Signature Adware.Generic
File size:31'651'984 bytes
First seen:2024-02-05 07:40:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e569e6f445d32ba23766ad67d1e3787f (263 x Adware.Generic, 41 x RecordBreaker, 24 x RedLineStealer)
ssdeep 786432:xzbBqYCYV23hu8qvSI79IOKho3tP4o1AAAQWVk3xa:pbBqF8dvSI79IOKS3tPRAAAQda
Threatray 9 similar samples on MalwareBazaar
TLSH T1F5673337F225B93EC86912324172E22005BB6F1A64174C5EABE42D0DFB7F1912EBED15
TrID 39.3% (.EXE) Inno Setup installer (107240/4/30)
21.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
15.7% (.EXE) InstallShield setup (43053/19/16)
15.2% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
3.8% (.EXE) Win64 Executable (generic) (10523/12/4)
File icon (PE):PE icon
dhash icon e8dad4c8accc8cdc (11 x Adware.Generic)
Reporter SecuriteInfoCom
Tags:Adware.Generic exe signed

Code Signing Certificate

Organisation:Versacor Offshore Software Private Limited
Issuer:DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
Algorithm:sha256WithRSAEncryption
Valid from:2023-11-02T00:00:00Z
Valid to:2024-11-08T23:59:59Z
Serial number: 09cdc9c0c9685fdb9a06e83815f7eb6c
Intelligence: 11 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 504c1ba5a2c5ff9391ebec0ca2501fbfc6935870dd7780727680f4bcd0af1e6c
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
297
Origin country :
FR FR
Vendor Threat Intelligence
Verdict:
No Threat
Threat level:
  10/10
Confidence:
100%
Tags:
fingerprint installer lolbin overlay packed setupapi shell32
Result
Verdict:
MALICIOUS
Result
Threat name:
n/a
Detection:
suspicious
Classification:
n/a
Score:
24 / 100
Signature
Malicious sample detected (through community Yara rule)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1386561 Sample: SecuriteInfo.com.Program.Un... Startdate: 05/02/2024 Architecture: WINDOWS Score: 24 66 Malicious sample detected (through community Yara rule) 2->66 8 SecuriteInfo.com.Program.Unwanted.5387.16902.11969.exe 2 2->8         started        11 msiexec.exe 286 147 2->11         started        13 rundll32.exe 2->13         started        process3 file4 38 SecuriteInfo.com.P...387.16902.11969.tmp, PE32 8->38 dropped 15 SecuriteInfo.com.Program.Unwanted.5387.16902.11969.tmp 43 96 8->15         started        40 C:\Windows\WinSxS\InstallTemp\...\vcomp.dll, PE32 11->40 dropped 42 C:\Windows\WinSxS\...\mfc80KOR.dll, PE32 11->42 dropped 44 C:\Windows\WinSxS\...\mfc80JPN.dll, PE32 11->44 dropped 46 37 other files (none is malicious) 11->46 dropped 18 msiexec.exe 11->18         started        20 msiexec.exe 11->20         started        process5 file6 48 C:\Users\user\AppData\Local\...\isskin.dll, PE32 15->48 dropped 50 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 15->50 dropped 52 C:\Users\user\AppData\...\Vistab.cjstyles, PE32 15->52 dropped 54 74 other files (none is malicious) 15->54 dropped 22 chrome.exe 1 15->22         started        25 vcredist_x64.exe 1 20 15->25         started        27 vcredist_x86.exe 1 4 15->27         started        29 2 other processes 15->29 process7 dnsIp8 56 192.168.2.6, 443, 49702, 49707 unknown unknown 22->56 58 239.255.255.250 unknown Reserved 22->58 31 chrome.exe 22->31         started        34 msiexec.exe 1 25->34         started        36 msiexec.exe 1 27->36         started        process9 dnsIp10 60 clients.l.google.com 173.194.219.139, 443, 49720 GOOGLEUS United States 31->60 62 www.google.com 74.125.136.103, 443, 49767, 49776 GOOGLEUS United States 31->62 64 5 other IPs or domains 31->64
Gathering data
Result
Malware family:
n/a
Score:
  4/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Executes dropped EXE
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments