MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8f27711d32521c92105a49bdb78e5042ac10e3fb635306b8e32fc198704e617d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Adwind
Vendor detections: 6
| SHA256 hash: | 8f27711d32521c92105a49bdb78e5042ac10e3fb635306b8e32fc198704e617d |
|---|---|
| SHA3-384 hash: | a0437e9f3cc99b2a07172834b8da6cb1c17b8cd831deb8d2d3799350f3841d83baef3f4e03f8e1220eaebe807a28a528 |
| SHA1 hash: | 6696c40a93e0c4878306cbcf9ee14671d85a8f3e |
| MD5 hash: | 7f9e9f8671cce95b2be02be52a24cbb2 |
| humanhash: | colorado-muppet-colorado-quiet |
| File name: | SWIFT COPY #9075321890.exe |
| Download: | download sample |
| Signature | Adwind |
| File size: | 2'649'448 bytes |
| First seen: | 2020-10-14 15:32:32 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'608 x Formbook, 12'242 x SnakeKeylogger) |
| ssdeep | 3072:nSWj5XXscn5wjbNco+i6jMVRSnTQaZsxNPqpKQvvfjmR1k5joyjVaFimsdWDZvCW:SWNrWmdj3TQcpEKRYN3 |
| Threatray | 1 similar samples on MalwareBazaar |
| TLSH | B8C5C73CADD5223756BBD6BAC9F55ACBF911754331526C0E90DB03860A03BAB7EC241E |
| Reporter | |
| Tags: | Adwind exe nVpn RAT |
abuse_ch
Malspam distributing Adwind:HELO: kgmlogistics.com
Sending IP: 37.48.83.10
From: Tony Blanche<Vitthal@kgmlogistics.com>
Subject: Payment Advise(Confirm Account Details)
Attachment: SWIFT COPY 9075321890.zip (contains "SWIFT COPY #9075321890.exe")
Adwind RAT C2s:
myapki.duckdns.org:5050 (194.5.97.130)
reboot.duckdns.org
localhost247.org:7786 (194.5.97.130)
Pointing to nVpn:
% Information related to '194.5.97.0 - 194.5.97.255'
% Abuse contact for '194.5.97.0 - 194.5.97.255' is 'abuse@privacyfirst.sh'
inetnum: 194.5.97.0 - 194.5.97.255
remarks: This prefix is assigned to The PRIVACYFIRST Project, which
remarks: operates infrastructure jointly used by various VPN service
remarks: providers. We have a very strong focus on privacy and freedom.
remarks: In case of abuse, we encourage all international law enforcement
remarks: agencies to get in touch with our abuse contact. Due to the fact
remarks: that we keep no logs of user activities and only share data when
remarks: it is legally required under our jurisdiction, it is very unlikely
remarks: for a demand of user information to be successful. Still, that
remarks: should not deter you from reaching out.
netname: PRIVACYFIRST-UK5
country: GB
admin-c: TPP15-RIPE
tech-c: TPP15-RIPE
org: ORG-TPP6-RIPE
mnt-by: PRIVACYFIRST-MNT
status: SUB-ALLOCATED PA
created: 2018-07-23T09:31:45Z
last-modified: 2020-08-26T17:48:55Z
source: RIPE
Intelligence
File Origin
# of uploads :
1
# of downloads :
777
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Sending a UDP request
Unauthorized injection to a recently created process
Launching a process
Creating a file
Creating a file in the Windows subdirectories
Creating a window
Changing a file
Running batch commands
Creating a process from a recently created file
Launching a tool to kill processes
Enabling autorun by creating a file
Result
Threat name:
ADWIND
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Creates an undocumented autostart registry key
Detected ADWIND Rat
Exploit detected, runtime environment starts unknown processes
Found malware configuration
Injects a PE file into a foreign processes
Java source code contains strings found in CrossRAT
Malicious sample detected (through community Yara rule)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AdWind RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.CoinMiner
Status:
Malicious
First seen:
2020-10-14 05:38:46 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
unknown
Result
Malware family:
n/a
Score:
8/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Kills process with taskkill
Suspicious use of SetWindowsHookEx
Suspicious use of SetThreadContext
Executes dropped EXE
Unpacked files
SH256 hash:
8f27711d32521c92105a49bdb78e5042ac10e3fb635306b8e32fc198704e617d
MD5 hash:
7f9e9f8671cce95b2be02be52a24cbb2
SHA1 hash:
6696c40a93e0c4878306cbcf9ee14671d85a8f3e
SH256 hash:
918cbe48f5563f8336124c49ff19313cc593a219bd5b33f6fd0b2e650391099a
MD5 hash:
329c760b0237672617a089d1b3373e4c
SHA1 hash:
37038ccdcc3f9c1e31b9c4811d7ecd7c30ce355a
SH256 hash:
165b6353a27653c087637f372f70713e4e0af658e87f03ba0703d8b975525243
MD5 hash:
112730ad698bcb62cfb8c64c4862640a
SHA1 hash:
6b42b1f3f372785c40b4f80c35d6aa2e0d012429
SH256 hash:
80b1a3100629b8e5aab6f7324594612d258907005b9718a47a199a9e995b6340
MD5 hash:
a3f7f0f002c70ff11dc5a4e675565a70
SHA1 hash:
6dc9eb7d2f33b95b583b5b49d4d1ce351282b8ff
SH256 hash:
8f5f60b3ac3de21af23fab55c000a4f007f6e955e7b32f53700eebca284300f2
MD5 hash:
7d7246d19e126a0fbce65a377afd720f
SHA1 hash:
70b27e9a0a718ae2925f73fdc48ccd2f4ac33790
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
CoinMiner
Score:
0.60
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.