MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8c5a0002888bb6e611df6d81d99711370399092a8bebc2b014e71fa509b3c430. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 8c5a0002888bb6e611df6d81d99711370399092a8bebc2b014e71fa509b3c430
SHA3-384 hash: 1a146cff003d837d8eee15d55b73c3963b4f3e280e3b4c2f16c2f8e3f14d01ed502f35e2a9a22fbfc3609177b2a53b11
SHA1 hash: 6c02985b774ff6d8ecd610535cf8fbdc7f0c7bd1
MD5 hash: c605b59d0c701483545d1e72f1a51235
humanhash: may-florida-papa-april
File name:c605b59d0c701483545d1e72f1a51235.exe
Download: download sample
File size:66'232 bytes
First seen:2020-09-10 05:40:22 UTC
Last seen:2020-09-10 06:43:19 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'748 x AgentTesla, 19'650 x Formbook, 12'246 x SnakeKeylogger)
ssdeep 1536:CeGOzMS8zBgRz3PF0lUf2kdtgrenq0S9WXib:CHOzMS8zBgRz/BOvCn5gg8
TLSH B5532BF2620BB12AECD75A342C5593B2356FCC36870E3706A761F22DCA3259578D1CE6
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
95
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Creating a window
Sending a TCP request to an infection source
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj
Score:
52 / 100
Signature
Binary contains a suspicious time stamp
Connects to a pastebin service (likely for C&C)
Machine Learning detection for sample
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Malicious
First seen:
2020-09-09 18:44:54 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
n/a
Score:
  4/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Modifies data under HKEY_USERS
Suspicious use of AdjustPrivilegeToken
Drops file in Windows directory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 8c5a0002888bb6e611df6d81d99711370399092a8bebc2b014e71fa509b3c430

(this sample)

  
Delivery method
Distributed via web download

Comments