MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8992b94e147a940a1da05b11631e28202c50840902fa372690485b49c415e4b5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Expiro


Vendor detections: 12


Intelligence 12 IOCs YARA 3 File information Comments

SHA256 hash: 8992b94e147a940a1da05b11631e28202c50840902fa372690485b49c415e4b5
SHA3-384 hash: 3439fb22577d56359e5d336d351874534cdbffad6ba0eb87562a2bb3d57c0328036ef58814d84862e97e85a65ea7fd30
SHA1 hash: 3dced4443af3c9591c948c827ac5b02bd0d31029
MD5 hash: 3d1072986b88dc6184e40ba0df6acfc2
humanhash: burger-mango-blue-florida
File name:SecuriteInfo.com.Win32.TrojanX-gen.29310.32138
Download: download sample
Signature Expiro
File size:1'656'832 bytes
First seen:2023-05-04 18:38:41 UTC
Last seen:2023-05-08 06:07:49 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:rPKokfY5HGAg4y2oLeeHlQFwSohxt3jIwYg94ZIgUZ8K5BEuww4sXpA5jp9DTS2I:LZWY5mz4yJSfu/9IwYgeJuw7sX0jpd
Threatray 21 similar samples on MalwareBazaar
TLSH T1D475122127A6BB91ECF6C3F83608E400AFB16C5457BAE6DC4CC7A0DD5154F19FA10AA7
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter SecuriteInfoCom
Tags:exe Expiro

Intelligence


File Origin
# of uploads :
2
# of downloads :
270
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Win32.TrojanX-gen.29310.32138
Verdict:
Malicious activity
Analysis date:
2023-05-04 18:39:19 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DarkCloud
Detection:
malicious
Classification:
spre.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates files inside the volume driver (system volume information)
Drops executable to a common third party application directory
Infects executable files (exe, dll, sys, html)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queries random domain names (often used to prevent blacklisting and sinkholes)
Snort IDS alert for network traffic
Tries to download HTTP data from a sinkholed server
Tries to harvest and steal browser information (history, passwords, etc)
Writes or reads registry keys via WMI
Yara detected DarkCloud
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 859403 Sample: SecuriteInfo.com.Win32.Troj... Startdate: 04/05/2023 Architecture: WINDOWS Score: 100 33 vyome.biz 2->33 47 Tries to download HTTP data from a sinkholed server 2->47 49 Snort IDS alert for network traffic 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 8 other signatures 2->53 7 SecuriteInfo.com.Win32.TrojanX-gen.29310.32138.exe 3 2->7         started        11 TieringEngineService.exe 2->11         started        13 armsvc.exe 1 2->13         started        16 16 other processes 2->16 signatures3 process4 dnsIp5 31 SecuriteInfo.com.W...29310.32138.exe.log, ASCII 7->31 dropped 61 Writes or reads registry keys via WMI 7->61 63 Injects a PE file into a foreign processes 7->63 18 SecuriteInfo.com.Win32.TrojanX-gen.29310.32138.exe 4 7->18         started        65 Creates files inside the volume driver (system volume information) 11->65 41 jpskm.biz 107.6.74.76, 49747, 49761, 80 VOXEL-DOT-NETUS United States 13->41 43 saytjshyf.biz 173.231.184.124, 49731, 49742, 49765 VOXEL-DOT-NETUS United States 13->43 45 35 other IPs or domains 13->45 file6 signatures7 process8 dnsIp9 35 dwrqljrr.biz 173.231.184.122, 49699, 49701, 49740 VOXEL-DOT-NETUS United States 18->35 37 cvgrf.biz 206.191.152.58, 49700, 49702, 80 VOXEL-DOT-NETUS United States 18->37 39 37 other IPs or domains 18->39 23 C:\Windows\System32\xbgmsvc.exe, PE32+ 18->23 dropped 25 C:\Windows\System32\wbengine.exe, PE32+ 18->25 dropped 27 C:\Windows\System32\wbem\WmiApSrv.exe, PE32+ 18->27 dropped 29 81 other malicious files 18->29 dropped 55 Tries to harvest and steal browser information (history, passwords, etc) 18->55 57 Drops executable to a common third party application directory 18->57 59 Infects executable files (exe, dll, sys, html) 18->59 file10 signatures11
Threat name:
ByteCode-MSIL.Trojan.Tnega
Status:
Malicious
First seen:
2023-05-04 15:25:14 UTC
File Type:
PE (.Net Exe)
Extracted files:
24
AV detection:
22 of 37 (59.46%)
Threat level:
  5/5
Result
Malware family:
darkcloud
Score:
  10/10
Tags:
family:darkcloud spyware stealer
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy service COM API
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
DarkCloud
Malware Config
C2 Extraction:
https://api.telegram.org/bot5955632087:AAGbHX-YygFpBeOiEaTfH9CY-2MMNrZcY48/sendMessage?chat_id=865011046
Unpacked files
SH256 hash:
2b6bb9637f7134c2eccd8b4dc740d1445fac04710abc04f8823bce2b63042ac9
MD5 hash:
6fa615f675dd4a68b9a1d527effc5d80
SHA1 hash:
7901c4dad10c87456b8b06ec4bea3a50f822b934
SH256 hash:
3b75425895af4ae3186b36277553641e37ca1d620ae18d68e40d13351b54de6a
MD5 hash:
94d1531b52774dce52a89e33646d5b1d
SHA1 hash:
29bf887b025b97bd7a9e1e261852ba824234a625
SH256 hash:
280001013946838a651abbdee890fa4a4d49c382b7b5e78b7805caef036304e2
MD5 hash:
d4b6893a5512534104c6c7403be60897
SHA1 hash:
d4b51c3e4cafb3b146435a4e2e21bb5ddf15956d
SH256 hash:
40c050c20d957d26b932faf690f9c2933a194aa6607220103ec798f46ac03403
MD5 hash:
c768bac25fc6f0551a11310e7caba8d5
SHA1 hash:
95f9195e959fb48277c95d1dd1c97a4edff7cb3a
SH256 hash:
b0041582df59e553cba7fb73c827d63556f990b53808ab55f599ab9c98a46e7c
MD5 hash:
9b73793f9c5cc3c7e09535e35e63c66e
SHA1 hash:
8cb02a37bc62ccb27c39ccb07f100274b44cbf9d
SH256 hash:
ce94d34c8412d5bccd65da1c8c8da61b2643152ea0410f11fa09b8bbee99885f
MD5 hash:
b9a12582ba9900c9fc58d5443b342157
SHA1 hash:
78e3b7f968732ca9714437d26528383a2ab95191
SH256 hash:
51e9b813382cd853599dab2833b2f70a358b5f2a72e91a8b5395ad6c45b63135
MD5 hash:
e7fb72dcd0dd9b9aa2421168f6278f91
SHA1 hash:
30c95a8ea72ecfbd6be438659474074e6934912c
SH256 hash:
8992b94e147a940a1da05b11631e28202c50840902fa372690485b49c415e4b5
MD5 hash:
3d1072986b88dc6184e40ba0df6acfc2
SHA1 hash:
3dced4443af3c9591c948c827ac5b02bd0d31029
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments