MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 89887d6a5f728886bc9f6012606918246c91ecafe903777f4fcda168217e9a5e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 89887d6a5f728886bc9f6012606918246c91ecafe903777f4fcda168217e9a5e
SHA3-384 hash: 00e9974b2f970f71140d954b3317ca20266ec04acc27b3de84d9449bed160e25f59be12e933b674bf8aa245a1589ca25
SHA1 hash: 9acf9ecb00df43c462799e6a73a1cb3723600a60
MD5 hash: 2a0480fe8c52398bb85fb19165d67598
humanhash: double-indigo-helium-spaghetti
File name:Speck-Triplex-Pumpen9054.exe
Download: download sample
File size:421'376 bytes
First seen:2021-08-26 12:37:59 UTC
Last seen:2021-08-26 13:45:24 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ef471c0edf1877cd5a881a6a8bf647b9 (66 x Formbook, 33 x Loki, 29 x Loda)
ssdeep 12288:LXe9PPlowWX0t6mOQwg1Qd15CcYk0We1K3N:ShloDX0XOf4E3N
Threatray 1'086 similar samples on MalwareBazaar
TLSH T10894DF50E94DACD9E7D9D1B3B12A8B10147ABBDB85F882AE2265771452F37C330B3C16
dhash icon e4a4a48c96b2f074 (22 x AgentTesla, 8 x Formbook, 5 x SnakeKeylogger)
Reporter ffforward
Tags:AutoIT exe FormBook xloader

Intelligence


File Origin
# of uploads :
2
# of downloads :
354
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Speck-Triplex-Pumpen9054.exe
Verdict:
Suspicious activity
Analysis date:
2021-08-26 11:38:39 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Sending a UDP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
AutoIt script contains suspicious strings
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.Noon
Status:
Malicious
First seen:
2021-08-26 08:10:55 UTC
File Type:
PE (Exe)
Extracted files:
14
AV detection:
19 of 28 (67.86%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
Modifies system certificate store
Enumerates physical storage devices
Unpacked files
SH256 hash:
9740732e06b01591c26397dc6e6d6600c417c67878b6df8bf47b2065f2dcb886
MD5 hash:
d185bfcfb90f0b023876b608757cfa0a
SHA1 hash:
327ff2faa3dd35741c1c44c026beb7bd99cfa78e
SH256 hash:
89887d6a5f728886bc9f6012606918246c91ecafe903777f4fcda168217e9a5e
MD5 hash:
2a0480fe8c52398bb85fb19165d67598
SHA1 hash:
9acf9ecb00df43c462799e6a73a1cb3723600a60
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via e-mail link

Comments