MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8aa550817d46cf03c8de5131ba7f9165bd6347a9eb5ab51784aaf10269a14963. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: 8aa550817d46cf03c8de5131ba7f9165bd6347a9eb5ab51784aaf10269a14963
SHA3-384 hash: a0b3ec50cfa6848347275b8fc7bd65049521fe7e2cd99f32b7997ee111b08ac7335d8582eb5e4b5ea0da31088c44c518
SHA1 hash: 734be143ed37f5655290a5cc245f2a240bf4d573
MD5 hash: 96466986eda91acdc9e95d92f70e23ff
humanhash: arkansas-five-cat-enemy
File name:SecuriteInfo.com.Trojan.GenericKD.31806946.17401.5827
Download: download sample
File size:147'968 bytes
First seen:2020-12-09 13:02:54 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 0c628ce26631f0c09e28725b059e600a (1 x RedLineStealer)
ssdeep 3072:RHpQlE3Lwd4jAy9eJCzeR7OXZe8GPBQuyREwz5nn6T4t94bVP:1AEbw2D9LzEIBW42wz5nt9u
Threatray 239 similar samples on MalwareBazaar
TLSH 29E3120B59F8DB3CC816877653D9D72ACACB536F4ADB074BDA5E255338A1860C0C938A
Reporter SecuriteInfoCom

Intelligence


File Origin
# of uploads :
1
# of downloads :
108
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Trojan.GenericKD.31806946.17401.5827
Verdict:
No threats detected
Analysis date:
2020-12-09 13:04:07 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
60 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Disfa
Status:
Malicious
First seen:
2019-03-19 17:10:29 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
Suspicious use of AdjustPrivilegeToken
Unpacked files
SH256 hash:
8aa550817d46cf03c8de5131ba7f9165bd6347a9eb5ab51784aaf10269a14963
MD5 hash:
96466986eda91acdc9e95d92f70e23ff
SHA1 hash:
734be143ed37f5655290a5cc245f2a240bf4d573
SH256 hash:
50b5dd9273d58b9b94cc486ed16c5317a466760c4bf0290636e6f33a6973c4bc
MD5 hash:
e6786d334760cf13efa38526542d0c85
SHA1 hash:
0730ed03ce2b9351d47491ca8fa37b4f1c76b4ba
SH256 hash:
c3a506f55ee5521ec9acad15ec4216d4c65da28fabb86df5d87095647083770f
MD5 hash:
420f693e0579f4392eeee82e52adda6b
SHA1 hash:
02944878f4adc108bc55ad6160e37fe9967769e8
SH256 hash:
dde9e85bcd941014be9038604ddc0f51c71180eeb71b005769442c639a3f298d
MD5 hash:
95c73df0b452be5bfff3f1d29f1249db
SHA1 hash:
da1a395f86f9d85efa96dfc017cf4f8a40375e84
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 8aa550817d46cf03c8de5131ba7f9165bd6347a9eb5ab51784aaf10269a14963

(this sample)

  
Delivery method
Distributed via web download

Comments