MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9294388f5992c2a12ea3f1dd14a232f3f681b759784411ce373ae95f23cefbee. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: 9294388f5992c2a12ea3f1dd14a232f3f681b759784411ce373ae95f23cefbee
SHA3-384 hash: 0b624991738852647389711bf95f5ee6f237aff4ce343d0fe2d89558125c867669c57501c0c2ab9601a06fbdd7c37025
SHA1 hash: 6e468647393b135d7235e55e98d61406d181ae60
MD5 hash: c9bdfa05b7a82b13a0935f97ffb6f6ac
humanhash: bluebird-summer-lion-fifteen
File name:Toka Locker.exe
Download: download sample
File size:6'904'755 bytes
First seen:2022-10-08 17:48:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 0bbecc8e9f9f17b0ea9cc3899b15e5cf (1 x RedLineStealer, 1 x CortaBot, 1 x CobaltStrike)
ssdeep 196608:2SLaAX/eI39onJ5hrZEReyiU8AdZYJERurTplBg:zxP39c5hlERuAdZYygrtl
Threatray 152 similar samples on MalwareBazaar
TLSH T1EE6612F4FE4027B4D4E1B8B5370946CC816DEA720B00A9BA8F58A1257B77DE15CBF690
TrID 48.7% (.EXE) Win64 Executable (generic) (10523/12/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon f0cc8e9296968ef0 (1 x njrat)
Reporter Anonymous
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
418
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Running batch commands
Searching for synchronization primitives
Launching a process
Creating a file
Launching the process to interact with network services
Сreating synchronization primitives
Creating a window
Sending a custom TCP request
Preventing system recovery
Blocking a possibility to launch for the Windows registry editor (regedit.exe)
Creating a file in the mass storage device
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
rans.evad
Score:
84 / 100
Signature
Disables the Windows registry editor (regedit)
Found potential ransomware demand text
Found ransom note / readme
Multi AV Scanner detection for submitted file
Uses bcdedit to modify the Windows boot settings
Uses cmd line tools excessively to alter registry or file data
Writes a notice file (html or txt) to demand a ransom
Yara detected RansomwareGeneric
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 718913 Sample: Toka Locker.exe Startdate: 08/10/2022 Architecture: WINDOWS Score: 84 54 Multi AV Scanner detection for submitted file 2->54 56 Found ransom note / readme 2->56 58 Yara detected RansomwareGeneric 2->58 60 3 other signatures 2->60 9 Toka Locker.exe 63 2->9         started        process3 file4 44 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 9->44 dropped 46 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 9->46 dropped 48 C:\Users\user\AppData\Local\...\python39.dll, PE32+ 9->48 dropped 50 50 other files (none is malicious) 9->50 dropped 12 Toka Locker.exe 3 9 9->12         started        16 conhost.exe 9->16         started        process5 file6 52 C:\Users\user\...\README_FOR_DECRYPT.txt, ASCII 12->52 dropped 66 Uses bcdedit to modify the Windows boot settings 12->66 18 cmd.exe 1 12->18         started        21 cmd.exe 1 12->21         started        23 cmd.exe 1 12->23         started        25 6 other processes 12->25 signatures7 process8 signatures9 62 Uses cmd line tools excessively to alter registry or file data 18->62 64 Uses bcdedit to modify the Windows boot settings 18->64 27 bcdedit.exe 7 1 18->27         started        29 reg.exe 1 1 21->29         started        32 bcdedit.exe 8 1 23->32         started        34 net.exe 1 25->34         started        36 reg.exe 1 25->36         started        38 reg.exe 1 25->38         started        40 2 other processes 25->40 process10 signatures11 68 Disables the Windows registry editor (regedit) 29->68 42 net1.exe 1 34->42         started        process12
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2022-10-08 11:37:05 UTC
File Type:
PE+ (Exe)
Extracted files:
392
AV detection:
12 of 39 (30.77%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
evasion pyinstaller ransomware
Behaviour
Modifies registry class
Modifies registry key
Opens file in notepad (likely ransom note)
Runs net.exe
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Loads dropped DLL
Disables RegEdit via registry modification
Modifies boot configuration data using bcdedit
Unpacked files
SH256 hash:
9294388f5992c2a12ea3f1dd14a232f3f681b759784411ce373ae95f23cefbee
MD5 hash:
c9bdfa05b7a82b13a0935f97ffb6f6ac
SHA1 hash:
6e468647393b135d7235e55e98d61406d181ae60
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:PyInstaller
Author:@bartblaze
Description:Identifies executable converted using PyInstaller.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments