MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8f27711d32521c92105a49bdb78e5042ac10e3fb635306b8e32fc198704e617d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Adwind


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 8f27711d32521c92105a49bdb78e5042ac10e3fb635306b8e32fc198704e617d
SHA3-384 hash: a0437e9f3cc99b2a07172834b8da6cb1c17b8cd831deb8d2d3799350f3841d83baef3f4e03f8e1220eaebe807a28a528
SHA1 hash: 6696c40a93e0c4878306cbcf9ee14671d85a8f3e
MD5 hash: 7f9e9f8671cce95b2be02be52a24cbb2
humanhash: colorado-muppet-colorado-quiet
File name:SWIFT COPY #9075321890.exe
Download: download sample
Signature Adwind
File size:2'649'448 bytes
First seen:2020-10-14 15:32:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'608 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 3072:nSWj5XXscn5wjbNco+i6jMVRSnTQaZsxNPqpKQvvfjmR1k5joyjVaFimsdWDZvCW:SWNrWmdj3TQcpEKRYN3
Threatray 1 similar samples on MalwareBazaar
TLSH B8C5C73CADD5223756BBD6BAC9F55ACBF911754331526C0E90DB03860A03BAB7EC241E
Reporter abuse_ch
Tags:Adwind exe nVpn RAT


Avatar
abuse_ch
Malspam distributing Adwind:

HELO: kgmlogistics.com
Sending IP: 37.48.83.10
From: Tony Blanche<Vitthal@kgmlogistics.com>
Subject: Payment Advise(Confirm Account Details)
Attachment: SWIFT COPY 9075321890.zip (contains "SWIFT COPY #9075321890.exe")

Adwind RAT C2s:
myapki.duckdns.org:5050 (194.5.97.130)
reboot.duckdns.org
localhost247.org:7786 (194.5.97.130)

Pointing to nVpn:

% Information related to '194.5.97.0 - 194.5.97.255'

% Abuse contact for '194.5.97.0 - 194.5.97.255' is 'abuse@privacyfirst.sh'

inetnum: 194.5.97.0 - 194.5.97.255
remarks: This prefix is assigned to The PRIVACYFIRST Project, which
remarks: operates infrastructure jointly used by various VPN service
remarks: providers. We have a very strong focus on privacy and freedom.
remarks: In case of abuse, we encourage all international law enforcement
remarks: agencies to get in touch with our abuse contact. Due to the fact
remarks: that we keep no logs of user activities and only share data when
remarks: it is legally required under our jurisdiction, it is very unlikely
remarks: for a demand of user information to be successful. Still, that
remarks: should not deter you from reaching out.
netname: PRIVACYFIRST-UK5
country: GB
admin-c: TPP15-RIPE
tech-c: TPP15-RIPE
org: ORG-TPP6-RIPE
mnt-by: PRIVACYFIRST-MNT
status: SUB-ALLOCATED PA
created: 2018-07-23T09:31:45Z
last-modified: 2020-08-26T17:48:55Z
source: RIPE

Intelligence


File Origin
# of uploads :
1
# of downloads :
777
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Unauthorized injection to a recently created process
Launching a process
Creating a file
Creating a file in the Windows subdirectories
Creating a window
Changing a file
Running batch commands
Creating a process from a recently created file
Launching a tool to kill processes
Enabling autorun by creating a file
Result
Threat name:
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Creates an undocumented autostart registry key
Detected ADWIND Rat
Exploit detected, runtime environment starts unknown processes
Found malware configuration
Injects a PE file into a foreign processes
Java source code contains strings found in CrossRAT
Malicious sample detected (through community Yara rule)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AdWind RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 298238 Sample: SWIFT COPY #9075321890.exe Startdate: 14/10/2020 Architecture: WINDOWS Score: 100 88 Found malware configuration 2->88 90 Malicious sample detected (through community Yara rule) 2->90 92 Antivirus detection for dropped file 2->92 94 6 other signatures 2->94 10 cmd.exe 1 2->10         started        12 SWIFT COPY #9075321890.exe 4 2->12         started        16 taskkill.exe 1 2->16         started        process3 file4 18 xwpqksqa.exe 3 10->18         started        20 conhost.exe 10->20         started        78 C:\Users\user\AppData\Roaming\...\vlc.exe, PE32 12->78 dropped 98 Creates an undocumented autostart registry key 12->98 100 Adds a directory exclusion to Windows Defender 12->100 102 Injects a PE file into a foreign processes 12->102 22 SWIFT COPY #9075321890.exe 4 12->22         started        25 powershell.exe 24 12->25         started        27 conhost.exe 16->27         started        signatures5 process6 file7 29 javaw.exe 28 18->29         started        72 C:\Windows\Temp\xwpqksqa.exe, PE32 22->72 dropped 33 cmstp.exe 9 7 22->33         started        35 conhost.exe 25->35         started        process8 dnsIp9 86 192.168.2.1 unknown unknown 29->86 80 C:\Users\...\Retrive3957882636470305739.vbs, ASCII 29->80 dropped 82 C:\Users\...\Retrive1990649194343932253.vbs, ASCII 29->82 dropped 37 java.exe 29->37         started        42 cmd.exe 29->42         started        44 cmd.exe 29->44         started        46 icacls.exe 29->46         started        file10 process11 dnsIp12 84 127.0.0.1 unknown unknown 37->84 74 C:\Users\...\Retrive4464626681325280580.vbs, ASCII 37->74 dropped 76 C:\Users\...\Retrive2443868423839069319.vbs, ASCII 37->76 dropped 96 Exploit detected, runtime environment starts unknown processes 37->96 48 cmd.exe 37->48         started        50 cmd.exe 37->50         started        52 conhost.exe 37->52         started        54 conhost.exe 42->54         started        56 cscript.exe 42->56         started        58 conhost.exe 44->58         started        60 cscript.exe 44->60         started        62 conhost.exe 46->62         started        file13 signatures14 process15 process16 64 conhost.exe 48->64         started        66 cscript.exe 48->66         started        68 conhost.exe 50->68         started        70 cscript.exe 50->70         started       
Threat name:
ByteCode-MSIL.Trojan.CoinMiner
Status:
Malicious
First seen:
2020-10-14 05:38:46 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Kills process with taskkill
Suspicious use of SetWindowsHookEx
Suspicious use of SetThreadContext
Executes dropped EXE
Unpacked files
SH256 hash:
8f27711d32521c92105a49bdb78e5042ac10e3fb635306b8e32fc198704e617d
MD5 hash:
7f9e9f8671cce95b2be02be52a24cbb2
SHA1 hash:
6696c40a93e0c4878306cbcf9ee14671d85a8f3e
SH256 hash:
918cbe48f5563f8336124c49ff19313cc593a219bd5b33f6fd0b2e650391099a
MD5 hash:
329c760b0237672617a089d1b3373e4c
SHA1 hash:
37038ccdcc3f9c1e31b9c4811d7ecd7c30ce355a
SH256 hash:
165b6353a27653c087637f372f70713e4e0af658e87f03ba0703d8b975525243
MD5 hash:
112730ad698bcb62cfb8c64c4862640a
SHA1 hash:
6b42b1f3f372785c40b4f80c35d6aa2e0d012429
SH256 hash:
80b1a3100629b8e5aab6f7324594612d258907005b9718a47a199a9e995b6340
MD5 hash:
a3f7f0f002c70ff11dc5a4e675565a70
SHA1 hash:
6dc9eb7d2f33b95b583b5b49d4d1ce351282b8ff
SH256 hash:
8f5f60b3ac3de21af23fab55c000a4f007f6e955e7b32f53700eebca284300f2
MD5 hash:
7d7246d19e126a0fbce65a377afd720f
SHA1 hash:
70b27e9a0a718ae2925f73fdc48ccd2f4ac33790
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Adwind

Executable exe 8f27711d32521c92105a49bdb78e5042ac10e3fb635306b8e32fc198704e617d

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments