MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 911503a00ba2338991c0252e6183ac36184d17048892ef51d91d4f950c7f51fb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 911503a00ba2338991c0252e6183ac36184d17048892ef51d91d4f950c7f51fb
SHA3-384 hash: df37f4a9afe2eb4c3f7bbb69e3a4544ed27479c229b8f8e0f76f5026223e54c381944cec2f9c58ed0cc57b51ec4c3ded
SHA1 hash: bb4e271db4bce8020fea9cc5d7ccb6a78a51add4
MD5 hash: b2752e4c4e009ec9b2bca302c708f4a8
humanhash: don-carpet-twelve-sink
File name:b2752e4c4e009ec9b2bca302c708f4a8.exe
Download: download sample
File size:429'568 bytes
First seen:2021-12-04 06:42:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash bbdc5cea7d9bbd6ae9c6a36e9d9fb769 (8 x RedLineStealer, 3 x RaccoonStealer, 1 x Smoke Loader)
ssdeep 12288:vps2ySeMQAIRF4aOzjS2NZET8uE6yBosSf8:hSS+4aOzjdU8rC
Threatray 1'406 similar samples on MalwareBazaar
TLSH T1A594BE00F7A0C035F1B726F859B6B3A9A92E79A16B7491CF17D116E94634AE0ED3070F
File icon (PE):PE icon
dhash icon e0e8e8e8aa66a499 (32 x RaccoonStealer, 23 x RedLineStealer, 14 x ArkeiStealer)
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
153
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://allserialnumbers.com/fl-studio-20-crack-keygen/
Verdict:
Malicious activity
Analysis date:
2021-12-03 17:39:52 UTC
Tags:
evasion trojan loader opendir rat redline stealer vidar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Sending an HTTP GET request
Sending a custom TCP request
Creating a file in the %temp% directory
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Creating a process from a recently created file
Creating a window
Query of malicious DNS domain
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
MeasuringTime
SystemUptime
EvasionQueryPerformanceCounter
CheckCmdLine
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
MedusaHTTP
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Yara detected MedusaHTTP
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 533771 Sample: MZ4HOtTLbH.exe Startdate: 04/12/2021 Architecture: WINDOWS Score: 92 39 Antivirus detection for URL or domain 2->39 41 Multi AV Scanner detection for dropped file 2->41 43 Yara detected MedusaHTTP 2->43 45 2 other signatures 2->45 7 MZ4HOtTLbH.exe 1 17 2->7         started        process3 dnsIp4 33 artguide.top 194.38.23.148, 49702, 80 PRAID-ASRU Ukraine 7->33 35 185.70.186.174, 80 HOSTKEY-ASNL Netherlands 7->35 37 2 other IPs or domains 7->37 27 C:\Users\user\AppData\...\5445495263.exe, PE32 7->27 dropped 29 C:\Users\user\AppData\Local\...\2wwbh2[1].cfg, PE32 7->29 dropped 31 C:\Users\user\AppData\Local\...\2wwbh2[1].cfg, PE32 7->31 dropped 49 Detected unpacking (changes PE section rights) 7->49 51 Detected unpacking (overwrites its own PE header) 7->51 53 May check the online IP address of the machine 7->53 12 cmd.exe 1 7->12         started        14 wuapihost.exe 7->14         started        16 cmd.exe 1 7->16         started        file5 signatures6 process7 process8 18 5445495263.exe 12->18         started        21 conhost.exe 12->21         started        23 taskkill.exe 1 14->23         started        25 conhost.exe 14->25         started        signatures9 47 Multi AV Scanner detection for dropped file 18->47
Threat name:
Win32.Trojan.Raccoon
Status:
Malicious
First seen:
2021-12-04 06:42:16 UTC
File Type:
PE (Exe)
Extracted files:
12
AV detection:
24 of 28 (85.71%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
autoit_exe
Legitimate hosting services abused for malware hosting/C2
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
Unpacked files
SH256 hash:
9d2595a41df97491e626cdc0afe35621cb2081d7f92ee94e1b47dc1c23843fd6
MD5 hash:
c01d561d5e23b0b7a5e826c778a34b8c
SHA1 hash:
5945d5fe0b5ea8be119e43720e98e8ea3d38f1df
SH256 hash:
911503a00ba2338991c0252e6183ac36184d17048892ef51d91d4f950c7f51fb
MD5 hash:
b2752e4c4e009ec9b2bca302c708f4a8
SHA1 hash:
bb4e271db4bce8020fea9cc5d7ccb6a78a51add4
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments