MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 89c84617b93bcf7591d7886cb4d585b7f1248ba0ac30c199ff01835c746f5723. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments 1

SHA256 hash: 89c84617b93bcf7591d7886cb4d585b7f1248ba0ac30c199ff01835c746f5723
SHA3-384 hash: 5e82faec227b08347a265292276adae38facf35cfade9f4f3f3e92314c657b346a47734293b99796d9f2932d6569ace6
SHA1 hash: 8263403e7147402df0e8e1eaae7686380ada489e
MD5 hash: 7ed58a7c24d306d4f28cb263b929325a
humanhash: cola-washington-edward-foxtrot
File name:7ed58a7c_by_Libranalysis
Download: download sample
File size:888'356 bytes
First seen:2021-05-22 00:13:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d3bf8a7746a8d1ee8f6e5960c3f69378 (247 x Formbook, 75 x AgentTesla, 64 x SnakeKeylogger)
ssdeep 24576:oRmJkcoQricOIQxiZY1iaD7kF9YaThO6s:NJZoQrbTFZY1iaDIF3Ts
Threatray 241 similar samples on MalwareBazaar
TLSH F015C021F5C58036C2B322B19E7EF76A963D69360336D29737C82E317EA05416B39763
Reporter Libranalysis


Avatar
Libranalysis
Uploaded as part of the sample sharing project

Intelligence


File Origin
# of uploads :
1
# of downloads :
129
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
7ed58a7c_by_Libranalysis
Verdict:
Malicious activity
Analysis date:
2021-05-22 00:36:20 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Deleting a recently created file
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a UDP request
Creating a process from a recently created file
Reading critical registry keys
Creating a file
Creating a file in the %AppData% directory
Stealing user critical data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
rans.spyw.evad
Score:
72 / 100
Signature
Antivirus / Scanner detection for submitted sample
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for submitted file
Sigma detected: WScript or CScript Dropper
Tries to harvest and steal browser information (history, passwords, etc)
Windows Update Standalone Installer command line found (may be used to bypass UAC)
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.Lokmwiz
Status:
Malicious
First seen:
2021-05-19 05:10:59 UTC
AV detection:
36 of 47 (76.60%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion ransomware spyware stealer trojan
Behaviour
Enumerates system info in registry
Modifies Control Panel
Modifies registry class
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Drops file in System32 directory
Sets desktop wallpaper using registry
Enumerates connected drives
Loads dropped DLL
Reads user/profile data of web browsers
UAC bypass
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE).

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-22 01:09:29 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0001.033] Anti-Behavioral Analysis::Timing/Delay Check QueryPerformanceCounter
1) [B0009.012] Anti-Behavioral Analysis::Human User Check
2) [F0002.002] Collection::Polling
4) [B0030.002] Command and Control::Receive Data
5) [B0030.001] Command and Control::Send Data
6) [C0002.009] Communication Micro-objective::Connect to Server::HTTP Communication
7) [C0002.012] Communication Micro-objective::Create Request::HTTP Communication
8) [C0002.017] Communication Micro-objective::Get Response::HTTP Communication
9) [C0002.004] Communication Micro-objective::Open URL::HTTP Communication
10) [C0002.003] Communication Micro-objective::Send Request::HTTP Communication
11) [C0003.001] Communication Micro-objective::Create Pipe::Interprocess Communication
12) [C0027.009] Cryptography Micro-objective::RC4::Encrypt Data
13) [C0021.005] Cryptography Micro-objective::Mersenne Twister::Generate Pseudo-random Sequence
14) [C0021.004] Cryptography Micro-objective::RC4 PRGA::Generate Pseudo-random Sequence
15) [C0026.001] Data Micro-objective::Base64::Encode Data
16) [C0026.002] Data Micro-objective::XOR::Encode Data
19) [B0043] Discovery::Taskbar Discovery
20) [C0045] File System Micro-objective::Copy File
21) [C0046] File System Micro-objective::Create Directory
22) [C0048] File System Micro-objective::Delete Directory
23) [C0047] File System Micro-objective::Delete File
24) [C0049] File System Micro-objective::Get File Attributes
25) [C0051] File System Micro-objective::Read File
26) [C0050] File System Micro-objective::Set File Attributes
27) [C0052] File System Micro-objective::Writes File
28) [E1510] Impact::Clipboard Modification
29) [C0007] Memory Micro-objective::Allocate Memory
30) [C0034.001] Operating System Micro-objective::Set Variable::Environment Variable
31) [C0036.004] Operating System Micro-objective::Create Registry Key::Registry
32) [C0036.002] Operating System Micro-objective::Delete Registry Key::Registry
33) [C0036.007] Operating System Micro-objective::Delete Registry Value::Registry
34) [C0036.003] Operating System Micro-objective::Open Registry Key::Registry
35) [C0036.005] Operating System Micro-objective::Query Registry Key::Registry
36) [C0036.006] Operating System Micro-objective::Query Registry Value::Registry
37) [C0036.001] Operating System Micro-objective::Set Registry Key::Registry
38) [C0040] Process Micro-objective::Allocate Thread Local Storage
39) [C0017] Process Micro-objective::Create Process
40) [C0038] Process Micro-objective::Create Thread
41) [C0054] Process Micro-objective::Resume Thread
42) [C0041] Process Micro-objective::Set Thread Local Storage Value
43) [C0018] Process Micro-objective::Terminate Process
44) [C0039] Process Micro-objective::Terminate Thread