MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8e122a7da836e05e954001c5f6e2209aa5e0835ea7af0e08e324e538a075f364. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 4 File information Comments 1

SHA256 hash: 8e122a7da836e05e954001c5f6e2209aa5e0835ea7af0e08e324e538a075f364
SHA3-384 hash: c45f33bca532524395e6fb9fcb6f6906edab7f0b0632111c6c04b596c54dd41fb8c9e41b9af2e642b7cc1b055f7790fa
SHA1 hash: 8bcdb6e168bd4dfcda015b9ccbde9e7decd9b2cf
MD5 hash: 42ea14c03fa3db312c03b4db8694ec9e
humanhash: venus-salami-music-hamper
File name:ORIENTAL -COMMERCIAL INVOICE.pdf.exe
Download: download sample
File size:1'080'194 bytes
First seen:2021-04-27 08:28:55 UTC
Last seen:2021-04-27 10:13:41 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ea4e67a31ace1a72683a99b80cf37830 (70 x Formbook, 64 x GuLoader, 54 x Loki)
ssdeep 24576:S6I+D9umZGEinooZlWVWzn2HXRG6K/bfuzHxtmMaOiV4orIMrdJWmpBiF:lI+RumZinoWZitKTfuJaS8ZqF
Threatray 4'459 similar samples on MalwareBazaar
TLSH BC35F13C0FADDC54F2C118B86376D741A5AE8912673EBA51CBA6BE9542F8DC07E4E103
Reporter abuse_ch
Tags:exe Telegram

Intelligence


File Origin
# of uploads :
2
# of downloads :
95
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ORIENTAL -COMMERCIAL INVOICE.pdf.exe
Verdict:
Malicious activity
Analysis date:
2021-04-27 08:32:06 UTC
Tags:
evasion stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a file
Unauthorized injection to a recently created process
Creating a window
Setting a keyboard event handler
Reading critical registry keys
Launching a process
Moving a recently created file
Replacing files
Deleting a recently created file
Sending a UDP request
Using the Windows Management Instrumentation requests
DNS request
Sending an HTTP GET request
Sending a custom TCP request
Stealing user critical data
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
StormKitty
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found many strings related to Crypto-Wallets (likely being stolen)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Uses an obfuscated file name to hide its real file extension (double extension)
Writes to foreign memory regions
Yara detected Generic Dropper
Yara detected StormKitty Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 398276 Sample: ORIENTAL -COMMERCIAL INVOIC... Startdate: 27/04/2021 Architecture: WINDOWS Score: 100 47 Malicious sample detected (through community Yara rule) 2->47 49 Antivirus detection for dropped file 2->49 51 Multi AV Scanner detection for submitted file 2->51 53 7 other signatures 2->53 8 ORIENTAL -COMMERCIAL INVOICE.pdf.exe 19 2->8         started        process3 file4 27 C:\Users\user\AppData\Local\...\epx4e0zek.dll, PE32 8->27 dropped 55 Maps a DLL or memory area into another process 8->55 12 ORIENTAL -COMMERCIAL INVOICE.pdf.exe 1 12 8->12         started        signatures5 process6 signatures7 57 Writes to foreign memory regions 12->57 59 Allocates memory in foreign processes 12->59 61 Sample uses process hollowing technique 12->61 63 3 other signatures 12->63 15 AppLaunch.exe 15 3 12->15         started        19 AppLaunch.exe 2 12->19         started        21 conhost.exe 12->21         started        23 InstallUtil.exe 12->23         started        process8 dnsIp9 29 3.246.11.0.in-addr.arpa 15->29 31 api.mylnikov.org 172.67.160.130, 443, 49698, 49725 CLOUDFLARENETUS United States 15->31 35 2 other IPs or domains 15->35 37 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 15->37 39 May check the online IP address of the machine 15->39 41 Tries to steal Instant Messenger accounts or passwords 15->41 33 3.246.11.0.in-addr.arpa 19->33 43 Tries to steal Mail credentials (via file access) 19->43 45 Tries to harvest and steal browser information (history, passwords, etc) 19->45 25 WerFault.exe 23->25         started        signatures10 process11
Threat name:
Win32.Trojan.Nemesis
Status:
Malicious
First seen:
2021-04-27 08:29:09 UTC
AV detection:
21 of 47 (44.68%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
spyware stealer
Behaviour
Checks processor information in registry
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Looks up external IP address via web service
Loads dropped DLL
Reads local data of messenger clients
Unpacked files
SH256 hash:
7a56563d1bfece51a74d87e7eb74cd58bb54d1b23e1859680bb18e5f604698b3
MD5 hash:
195b7beebdbb3f494ecfd18997fdf39d
SHA1 hash:
a4629675e04ef29cb1fafe8dba957bb90b7ba00c
SH256 hash:
061894ced88db97141cdaf824d15380778c5866d6a444bd35f79628039760dbd
MD5 hash:
73e79a2afddc1a61421eec3da34a9f89
SHA1 hash:
0ddb7bb2210dfea8ea348fed733bdfeabd3d4aac
SH256 hash:
8e122a7da836e05e954001c5f6e2209aa5e0835ea7af0e08e324e538a075f364
MD5 hash:
42ea14c03fa3db312c03b4db8694ec9e
SHA1 hash:
8bcdb6e168bd4dfcda015b9ccbde9e7decd9b2cf
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:Telegram_bot_mem
Author:James_inthe_box
Description:Telegram in files like avemaria
Rule name:Telegram_Exfiltration_Via_Api
Author:lsepaolo

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-04-27 09:11:41 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [C0032.001] Data Micro-objective::CRC32::Checksum
1) [C0026.002] Data Micro-objective::XOR::Encode Data
4) [C0046] File System Micro-objective::Create Directory
5) [C0048] File System Micro-objective::Delete Directory
6) [C0047] File System Micro-objective::Delete File
7) [C0049] File System Micro-objective::Get File Attributes
8) [C0051] File System Micro-objective::Read File
9) [C0050] File System Micro-objective::Set File Attributes
10) [C0052] File System Micro-objective::Writes File
11) [E1510] Impact::Clipboard Modification
12) [C0036.004] Operating System Micro-objective::Create Registry Key::Registry
13) [C0036.002] Operating System Micro-objective::Delete Registry Key::Registry
14) [C0036.003] Operating System Micro-objective::Open Registry Key::Registry
15) [C0036.005] Operating System Micro-objective::Query Registry Key::Registry
16) [C0036.006] Operating System Micro-objective::Query Registry Value::Registry
17) [C0017] Process Micro-objective::Create Process
18) [C0038] Process Micro-objective::Create Thread