MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8e68d0c5c49b320b733435719e615638a67aed01a665ad812d2258368084a36c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stop
Vendor detections: 13
| SHA256 hash: | 8e68d0c5c49b320b733435719e615638a67aed01a665ad812d2258368084a36c |
|---|---|
| SHA3-384 hash: | eb41ab3ec7b1ccc82b4b9e856c8198e7cdbb03df14baa2989ed7f7538317454e8f8dd0f38999a123704af1ab9b8392f9 |
| SHA1 hash: | afeb1ce64b59ea20876bc2fee8a70023e56d6797 |
| MD5 hash: | 6801db35f78978c4b99f6d78a5753eff |
| humanhash: | muppet-montana-three-oxygen |
| File name: | 6801db35f78978c4b99f6d78a5753eff.exe |
| Download: | download sample |
| Signature | Stop |
| File size: | 840'192 bytes |
| First seen: | 2022-10-12 10:22:10 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f86972b0b9fc89569bd497bebfd6a497 (25 x Smoke Loader, 4 x ArkeiStealer, 4 x RedLineStealer) |
| ssdeep | 12288:5yf00VlzMVFQbBak0/F75nmzcUybWb0g0kRayJWX3TZa:5qZVtwFQbwVmdwgBaFX3T |
| Threatray | 2'510 similar samples on MalwareBazaar |
| TLSH | T152051224B782C8B6C4062E748917DFE112BFEC32687C5257F7A92B5D9F22380566634F |
| TrID | 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 16.4% (.EXE) Win64 Executable (generic) (10523/12/4) 10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.0% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 38b078eccacccc43 (88 x Smoke Loader, 38 x Stop, 33 x RedLineStealer) |
| Reporter | |
| Tags: | exe Stop |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://116.202.186.42/ | https://threatfox.abuse.ch/ioc/880349/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
https://t.me/truewallets
https://mas.to/@zara99
http://116.203.10.3:80
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | BitcoinAddress |
|---|---|
| Author: | Didier Stevens (@DidierStevens) |
| Description: | Contains a valid Bitcoin address |
| Rule name: | MALWARE_Win_STOP |
|---|---|
| Author: | ditekSHen |
| Description: | Detects STOP ransomware |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | SUSP_XORed_URL_in_EXE |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | SUSP_XORed_URL_in_EXE_RID2E46 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | Vidar |
|---|---|
| Author: | kevoreilly,rony |
| Description: | Vidar Payload |
| Rule name: | win_stop_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.stop. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.