MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8ab95f9e0939440cdf4b85fcb1e5c950d3dc1ec99181633ae0953d1095e9dc2c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments 1

SHA256 hash: 8ab95f9e0939440cdf4b85fcb1e5c950d3dc1ec99181633ae0953d1095e9dc2c
SHA3-384 hash: 08f9a4167cd6a21e6ec23457374bb1752bebebd7700735fdfdba6f254d5794d222a4a7c4c16d2ed63c43ee740654e0e1
SHA1 hash: 93d672191e701038377193a979443b0a721343c7
MD5 hash: fd72ab2d8ac3b6c66cdf70806e73fc29
humanhash: mike-cardinal-monkey-steak
File name:fd72ab2d8ac3b6c66cdf70806e73fc29
Download: download sample
File size:1'759'744 bytes
First seen:2021-11-22 11:28:55 UTC
Last seen:2021-11-22 13:59:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 09d0478591d4f788cb3e5ea416c25237 (4 x Worm.Mofksys, 3 x Blackmoon, 2 x Gh0stRAT)
ssdeep 49152:fF99rpQOe7F4n80zwmn1UFKsFXinzupQGkLPe:fbbUyn8c31UFRYzfbT
Threatray 6 similar samples on MalwareBazaar
TLSH T19D8501267AEF255DF464F5F85ACAC33E8B99F5EE92474E3B104853970BC8A106F42870
dhash icon 00b860f299dc2ed6 (14 x ACRStealer, 2 x ValleyRAT, 1 x RiseProStealer)
Reporter zbetcheckin
Tags:32 exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
104
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Youtube+Auto+Viewer+Bot.zip
Verdict:
Malicious activity
Analysis date:
2021-11-22 03:39:22 UTC
Tags:
evasion trojan loader opendir stealer raccoon vidar rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file
Reading critical registry keys
DNS request
Sending a custom TCP request
Stealing user critical data
Sending an HTTP GET request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw
Score:
68 / 100
Signature
Drops PE files to the document folder of the user
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Tries to harvest and steal browser information (history, passwords, etc)
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Passteal
Status:
Malicious
First seen:
2021-11-22 11:29:27 UTC
File Type:
PE (Exe)
Extracted files:
804
AV detection:
17 of 28 (60.71%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
evasion spyware stealer trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Checks whether UAC is enabled
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
ae28e4485692293532e82319840bde193dba55aa8028c10a0d2341cf35435723
MD5 hash:
a8620530592aa950581ec771bb955fb9
SHA1 hash:
45a50e5f93990c78adbf0a2f7d45eb2544204593
SH256 hash:
8ab95f9e0939440cdf4b85fcb1e5c950d3dc1ec99181633ae0953d1095e9dc2c
MD5 hash:
fd72ab2d8ac3b6c66cdf70806e73fc29
SHA1 hash:
93d672191e701038377193a979443b0a721343c7
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 8ab95f9e0939440cdf4b85fcb1e5c950d3dc1ec99181633ae0953d1095e9dc2c

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-11-22 11:28:57 UTC

url : hxxps://vinmall.de/download/vinmall_dd.exe