MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9329d5d88208298ef930bd5f126aec96ac18c08933872b36bdbbf041a6cb462a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments 1

SHA256 hash: 9329d5d88208298ef930bd5f126aec96ac18c08933872b36bdbbf041a6cb462a
SHA3-384 hash: 695009de45f311eb4c980ad7c7463352c1327d36d4abc783c66a66f5a9ff631d15b9a2973a28bd679554d041f9fce957
SHA1 hash: c1a8531080aae300c610c27b8e1ead3682495822
MD5 hash: 1340b3204b9a556e4f06fb0968ed3eb2
humanhash: nevada-cold-glucose-queen
File name:1340b320_by_Libranalysis
Download: download sample
File size:994'816 bytes
First seen:2021-04-29 19:08:02 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2d61767a66f97802f04479dc222ea0b1
ssdeep 24576:HdW9Wb15MYKO1ZculTrgrjS+TNkdBAnlXG6+Z1mbXPT:80MYKO1ZciTkrjSmkUlXF+Z1IfT
Threatray 136 similar samples on MalwareBazaar
TLSH 6125D11275B2C037E46591B14D6DEB61907DFD340B3649DB73C02A2E6E30AD2AF32A76
Reporter Libranalysis


Avatar
Libranalysis
Uploaded as part of the sample sharing project

Intelligence


File Origin
# of uploads :
1
# of downloads :
80
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Sending an HTTP GET request
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a process with a hidden window
Reading critical registry keys
Deleting a recently created file
Sending a custom TCP request
Sending a UDP request
Replacing files
Sending an HTTP GET request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw
Score:
84 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.CookiesStealer
Status:
Malicious
First seen:
2021-04-28 21:59:10 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Executes dropped EXE
UPX packed file
Unpacked files
SH256 hash:
9329d5d88208298ef930bd5f126aec96ac18c08933872b36bdbbf041a6cb462a
MD5 hash:
1340b3204b9a556e4f06fb0968ed3eb2
SHA1 hash:
c1a8531080aae300c610c27b8e1ead3682495822
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-04-29 20:04:00 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0012.001] Anti-Static Analysis::Argument Obfuscation
1) [C0002.012] Communication Micro-objective::Create Request::HTTP Communication
2) [C0002.017] Communication Micro-objective::Get Response::HTTP Communication
3) [C0002.014] Communication Micro-objective::Read Header::HTTP Communication
4) [C0002.013] Communication Micro-objective::Set Header::HTTP Communication
5) [C0002.008] Communication Micro-objective::WinHTTP::HTTP Communication
6) [C0026.002] Data Micro-objective::XOR::Encode Data
7) [C0030.005] Data Micro-objective::FNV::Non-Cryptographic Hash
9) [B0023] Execution::Install Additional Program
10) [C0047] File System Micro-objective::Delete File
11) [C0051] File System Micro-objective::Read File
12) [C0052] File System Micro-objective::Writes File
13) [C0034.001] Operating System Micro-objective::Set Variable::Environment Variable
14) [C0036.004] Operating System Micro-objective::Create Registry Key::Registry
15) [C0036.003] Operating System Micro-objective::Open Registry Key::Registry
16) [C0036.001] Operating System Micro-objective::Set Registry Key::Registry
17) [C0040] Process Micro-objective::Allocate Thread Local Storage
18) [C0017] Process Micro-objective::Create Process
19) [C0041] Process Micro-objective::Set Thread Local Storage Value
20) [C0018] Process Micro-objective::Terminate Process