MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 90fedb113e6cb696689506f223805f23ebcf07cb5794af35bb3fd2dd0589c81e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 9
| SHA256 hash: | 90fedb113e6cb696689506f223805f23ebcf07cb5794af35bb3fd2dd0589c81e |
|---|---|
| SHA3-384 hash: | e880f60f16cf28f9e2ae50b31a81eb912ebbf31a749e92c2641b80aef2da8f20e52b4973473b7f4baab148504dbd75fb |
| SHA1 hash: | 27fb067defa7af488faf3b6bf81442758682ba4b |
| MD5 hash: | 40809f97e0a9472720a97afdf1eaf040 |
| humanhash: | summer-summer-pluto-speaker |
| File name: | 40809f97e0a9472720a97afdf1eaf040.exe |
| Download: | download sample |
| File size: | 8'568'520 bytes |
| First seen: | 2024-10-06 18:24:36 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 6742ddbcd39f44e4cf3c1ddb8cea7257 (1 x LummaStealer) |
| ssdeep | 196608:LEUqZAW8hM9L248PIjF6jLfQ47YJ3xt0mh2sSn26UVRFXGn:LEUqZSixO+6jxyDfkVd |
| TLSH | T18986335529D781E8C8C20DA9331B29DB23F3A1AF449ED53536C63402B462FFB518E97B |
| TrID | 42.7% (.EXE) Win32 Executable (generic) (4504/4/1) 19.2% (.EXE) OS/2 Executable (generic) (2029/13) 19.0% (.EXE) Generic Win/DOS Executable (2002/3) 18.9% (.EXE) DOS Executable Generic (2000/1) |
| Magika | pebin |
| Reporter | |
| Tags: | exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
341
Origin country :
NLVendor Threat Intelligence
Verdict:
Clean
Score:
84.2%
Tags:
injection exploit
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
lolbin mshtml overlay packed
Verdict:
Malicious
Labled as:
Win/malicious_confidence_100%
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Suspicious
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2024-10-06 18:25:06 UTC
File Type:
PE (Exe)
AV detection:
12 of 23 (52.17%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
90fedb113e6cb696689506f223805f23ebcf07cb5794af35bb3fd2dd0589c81e
MD5 hash:
40809f97e0a9472720a97afdf1eaf040
SHA1 hash:
27fb067defa7af488faf3b6bf81442758682ba4b
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
exe 90fedb113e6cb696689506f223805f23ebcf07cb5794af35bb3fd2dd0589c81e
(this sample)
Delivery method
Distributed via web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| COM_BASE_API | Can Download & Execute components | ole32.dll::CoCreateInstance |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.