MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8957d0b2b03b8f56fa7d60f4cafbe98f12adae548e66e21ec25e5cb224979e36. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SamoRAT


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 8957d0b2b03b8f56fa7d60f4cafbe98f12adae548e66e21ec25e5cb224979e36
SHA3-384 hash: 3cbd5cafb1995a5a965b6041f1ca10187dcc845eb0d52e4b492fadfa2655f2ad54f75749ee4123a9e5776a50c340f649
SHA1 hash: 50371cc42402d94cfb43e9942d1a506174839eb1
MD5 hash: dcc35e49ac1c768d838efe3b161fb5f9
humanhash: video-fillet-fruit-jersey
File name:8957d0b2b03b8f56fa7d60f4cafbe98f12adae548e66e21ec25e5cb224979e36
Download: download sample
Signature SamoRAT
File size:28'672 bytes
First seen:2020-07-09 11:14:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 768:5Qwi/P7yZBymFzbovKzPra0N98dWbhWNNwf9L3NpRbYcglL:5tejyZBymFzbovKXv9JbhWWTN2L
Threatray 343 similar samples on MalwareBazaar
TLSH A8D2FA40B3FD0624F1FE5B79ADB5071989B3BE175921DE0E3CCD505E5B32A809A42FA2
Reporter JAMESWT_WT
Tags:SamoRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Using the Windows Management Instrumentation requests
Creating a file
Enabling the 'hidden' option for recently created files
Running batch commands
Creating a process with a hidden window
Launching a process
Creating a process from a recently created file
DNS request
Sending an HTTP GET request
Creating a window
Launching a service
Enabling autorun with Startup directory
Sending an HTTP POST request to an infection source
Sending an HTTP GET request to an infection source
Threat name:
ByteCode-MSIL.Trojan.AntiWD
Status:
Malicious
First seen:
2020-06-25 04:07:05 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
24 of 31 (77.42%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Contains code to disable Windows Defender
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments