MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 944ef2c62506efbcbd27d579ff3ff1353dfb2258cfcafd4813d05c4e51ebbf2b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 12


Intelligence 12 IOCs YARA 6 File information Comments

SHA256 hash: 944ef2c62506efbcbd27d579ff3ff1353dfb2258cfcafd4813d05c4e51ebbf2b
SHA3-384 hash: 2e3e4d58face377effd4a00ddeb768e41192689ac4eb5db52b7af32f4a65d7f22f9c5496838621c39177c6f4f7dfd2a3
SHA1 hash: 39896aa5ed4d7bce42a68d83427b323f82e4b66e
MD5 hash: c986fd191480dd53fe2b1c6f0d689ee5
humanhash: north-delta-aspen-zulu
File name:c986fd191480dd53fe2b1c6f0d689ee5.exe
Download: download sample
File size:18'253'522 bytes
First seen:2025-03-26 07:08:18 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d7e2fd259780271687ffca462b9e69b7 (6 x AsyncRAT, 6 x LummaStealer, 6 x AurotunStealer)
ssdeep 393216:sp789W6XI+4TufDp8p7sHuJgyOei1pOU55jQEjC7sQASv4hJjheP+8:s5gWKv9SAEgyM7OMyEjC7/v4DqH
TLSH T178073331A166413AEAF142F3E83452313C38E7342B528D79D7C86E5D3DAC8A177BB256
TrID 32.2% (.EXE) Win64 Executable (generic) (10522/11/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4504/4/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
dhash icon b2e1b496a6cada72 (13 x LummaStealer, 12 x AsyncRAT, 8 x Rhadamanthys)
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
450
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
c986fd191480dd53fe2b1c6f0d689ee5.exe
Verdict:
Malicious activity
Analysis date:
2025-03-26 07:09:10 UTC
Tags:
auto generic stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
autorun dropper spawn sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the Windows subdirectories
Creating a process from a recently created file
Creating a file in the %temp% directory
Creating a window
Creating a file in the %AppData% subdirectories
Launching cmd.exe command interpreter
Connection attempt
Transferring files using the Background Intelligent Transfer Service (BITS)
Enabling the 'hidden' option for recently created files
Unauthorized injection to a recently created process
Unauthorized injection to a system process
Enabling autorun by creating a file
Verdict:
Malicious
Labled as:
TrojanDownloader_Win32_Rugmi_rfn
Result
Verdict:
UNKNOWN
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Creates a thread in another existing process (thread injection)
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1648791 Sample: E1AcRCtgSA.exe Startdate: 26/03/2025 Architecture: WINDOWS Score: 100 92 tastedata.shop 2->92 114 Malicious sample detected (through community Yara rule) 2->114 116 Multi AV Scanner detection for dropped file 2->116 118 Multi AV Scanner detection for submitted file 2->118 120 PE file has nameless sections 2->120 13 E1AcRCtgSA.exe 3 2->13         started        16 Riffstation.exe 1 2->16         started        19 msedge.exe 2->19         started        signatures3 process4 dnsIp5 86 C:\Windows\Temp\...1AcRCtgSA.exe, PE32 13->86 dropped 22 E1AcRCtgSA.exe 19 13->22         started        112 Maps a DLL or memory area into another process 16->112 26 cmd.exe 2 16->26         started        96 239.255.255.250 unknown Reserved 19->96 28 msedge.exe 19->28         started        31 msedge.exe 19->31         started        33 msedge.exe 19->33         started        file6 signatures7 process8 dnsIp9 76 C:\Windows\Temp\...\libwinpthread-1.dll, PE32 22->76 dropped 78 C:\Windows\Temp\...\libstdc++-6.dll, PE32 22->78 dropped 80 C:\Windows\Temp\...\libgcc_s_dw2-1.dll, PE32 22->80 dropped 84 8 other malicious files 22->84 dropped 134 Multi AV Scanner detection for dropped file 22->134 35 Riffstation.exe 13 22->35         started        82 C:\Users\user\AppData\Local\Temp\ohqoxrtie, PE32+ 26->82 dropped 136 Writes to foreign memory regions 26->136 138 Maps a DLL or memory area into another process 26->138 39 JJValid_test.exe 26->39         started        41 conhost.exe 26->41         started        100 ax-0003.ax-msedge.net 150.171.28.12, 443, 49781 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 28->100 102 20.110.205.119, 443, 49814 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 28->102 104 32 other IPs or domains 28->104 file10 signatures11 process12 file13 68 C:\Users\user\AppData\...\libwinpthread-1.dll, PE32 35->68 dropped 70 C:\Users\user\AppData\...\libstdc++-6.dll, PE32 35->70 dropped 72 C:\Users\user\AppData\...\libgcc_s_dw2-1.dll, PE32 35->72 dropped 74 7 other malicious files 35->74 dropped 130 Switches to a custom stack to bypass stack traces 35->130 132 Found direct / indirect Syscall (likely to bypass EDR) 35->132 43 Riffstation.exe 1 35->43         started        signatures14 process15 signatures16 140 Maps a DLL or memory area into another process 43->140 142 Switches to a custom stack to bypass stack traces 43->142 144 Found direct / indirect Syscall (likely to bypass EDR) 43->144 46 cmd.exe 5 43->46         started        process17 file18 88 C:\Users\user\AppData\...\JJValid_test.exe, PE32+ 46->88 dropped 90 C:\Users\user\AppData\Local\Temp\bws, PE32+ 46->90 dropped 146 Writes to foreign memory regions 46->146 148 Found hidden mapped module (file has been removed from disk) 46->148 150 Maps a DLL or memory area into another process 46->150 152 Switches to a custom stack to bypass stack traces 46->152 50 JJValid_test.exe 46->50         started        54 conhost.exe 46->54         started        signatures19 process20 dnsIp21 94 tastedata.shop 104.21.73.174, 443, 49732, 49733 CLOUDFLARENETUS United States 50->94 122 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 50->122 124 Tries to harvest and steal browser information (history, passwords, etc) 50->124 126 Writes to foreign memory regions 50->126 128 4 other signatures 50->128 56 chrome.exe 2 50->56         started        59 msedge.exe 50->59         started        signatures22 process23 dnsIp24 98 192.168.2.5, 138, 443, 49297 unknown unknown 56->98 61 chrome.exe 56->61         started        64 chrome.exe 56->64         started        66 msedge.exe 59->66         started        process25 dnsIp26 106 www.google.com 142.251.35.164, 443, 49743, 49744 GOOGLEUS United States 61->106 108 plus.l.google.com 142.251.35.174, 443, 49751 GOOGLEUS United States 61->108 110 4 other IPs or domains 61->110
Threat name:
Win32.Trojan.Rugmi
Status:
Malicious
First seen:
2025-03-19 10:10:39 UTC
File Type:
PE (Exe)
Extracted files:
33
AV detection:
17 of 36 (47.22%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery spyware stealer
Behaviour
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
793be4aa63e0ca5ed6d1c4877cff06a9445c0c167c98063adef6eefdd0eaeef5
MD5 hash:
6964f26f24bc92b7e32247cdab1fea8c
SHA1 hash:
e03ad1997d0784240727fe37902a3ec09e58b6ab
SH256 hash:
55dfd9e2e0fc481fd6c024f8e9bb56717ded49e6cf0a708c5ec1ef49044ddd78
MD5 hash:
58139eb26c32b80c623b45745cad5d5a
SHA1 hash:
1d3281280ce30ae99550f875d4616bd5a78a4ee7
SH256 hash:
61653ada38d8b66767675b36a8ed6fd6e3b158ee650f34339196f38f5fe1ca17
MD5 hash:
619c3ef6efed75ffe3913633bc17c6a7
SHA1 hash:
2d86204306adeab693a994e7f2bebd81f5280653
SH256 hash:
3c550bd2605bd1d2d87e3b33da8e3dade200d300dc0689fec3486dad0787ef27
MD5 hash:
9b99f3e563dc29ee4fd71fcbf86bce66
SHA1 hash:
64f363625931cd0745826a8e8f838fe8a11d6922
SH256 hash:
97abaa2c0fa4bcfa191454e44552621fb3a1dceedfcbd695566062a72065099a
MD5 hash:
909cc62aa64dc6b3482f2e2c56293a1c
SHA1 hash:
8fe8fe896a6cdcec8aa984013c3599e5a098fc02
SH256 hash:
26edc2c24cf63da6d4588f97e31842daea4278de41aeb62570b9e3e4b7073057
MD5 hash:
19c8c1c076ea73ae9df4229e7f9832cb
SHA1 hash:
d3e68fe9efb2061f6cd14a039dfc948073c3e441
SH256 hash:
75e8103f3947f4b764f499ea16ea09a85516c667e4dd2189e48a7695e911af9e
MD5 hash:
64bf27c143384bbde2c3d32b1bada943
SHA1 hash:
d9d302e3c4fcb371835d3a11c4bb34a4ac800352
SH256 hash:
6c36130bdeb8368bed34157182c81215ad6bd0b1182e0616602660bdf472af0e
MD5 hash:
eff177fff0097a6bfc7094fb8eda9677
SHA1 hash:
df18217fe7159261d38270369f7a77236a6c7e00
SH256 hash:
3b24b567fe34c59e6f77c7fc99e7b47eeedf4606bb3a35ef2a6118e4a8ca386c
MD5 hash:
efd43a932ff1f7169d0fa65e09cc75ea
SHA1 hash:
0bfdae7b0e45d4cbb18acc1c188c48c23b464891
SH256 hash:
4d2e2d408d399d066b0aaef2047f7a33515c13c589832de0d9f1ba87a530c394
MD5 hash:
043b39434829ce93637b1801d57b2082
SHA1 hash:
297b5f72104130e17d92789adbbcfab8fe700a82
SH256 hash:
79622396dc4c7afbbceca03e69f727bf1862735ee3ad671aa3ee7ada8aa446c3
MD5 hash:
dff338824edea7e20c7f7b2690045090
SHA1 hash:
f822aa16fb0911f663753afd6540a715231bc00a
SH256 hash:
a6edb3fb6d21dd461da3767a7995034e208f7d6b08997f6cf7ee7b0ea833a8f0
MD5 hash:
cabb58bb5694f8b8269a73172c85b717
SHA1 hash:
9ed583c56385fed8e5e0757ddb2fdf025f96c807
SH256 hash:
68bee500e0080f21c003126e73b6d07804d23ac98b2376a8b76c26297d467abe
MD5 hash:
d4dae7149d6e4dab65ac554e55868e3b
SHA1 hash:
b3bea0a0a1f0a6f251bcf6a730a97acc933f269a
SH256 hash:
944ef2c62506efbcbd27d579ff3ff1353dfb2258cfcafd4813d05c4e51ebbf2b
MD5 hash:
c986fd191480dd53fe2b1c6f0d689ee5
SHA1 hash:
39896aa5ed4d7bce42a68d83427b323f82e4b66e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:pe_detect_tls_callbacks
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::AllocateAndInitializeSid
ADVAPI32.dll::ConvertStringSecurityDescriptorToSecurityDescriptorW
ADVAPI32.dll::CreateWellKnownSid
ADVAPI32.dll::SetEntriesInAclW
ADVAPI32.dll::SetEntriesInAclA
ADVAPI32.dll::SetNamedSecurityInfoW
COM_BASE_APICan Download & Execute componentsole32.dll::CLSIDFromProgID
ole32.dll::CoCreateInstance
ole32.dll::CoInitializeSecurity
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::CheckTokenMembership
ADVAPI32.dll::GetTokenInformation
ADVAPI32.dll::SetSecurityDescriptorDacl
ADVAPI32.dll::SetSecurityDescriptorGroup
ADVAPI32.dll::SetSecurityDescriptorOwner
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteExW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
ADVAPI32.dll::OpenProcessToken
KERNEL32.dll::OpenProcess
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileExW
KERNEL32.dll::CopyFileW
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::CreateFileA
KERNEL32.dll::CreateFileMappingW
WIN_BASE_USER_APIRetrieves Account InformationKERNEL32.dll::GetComputerNameW
ADVAPI32.dll::GetUserNameW
ADVAPI32.dll::LookupPrivilegeValueW
WIN_BCRYPT_APICan Encrypt FilesADVAPI32.dll::DecryptFileW
WIN_CRYPT_APIUses Windows Crypt APIADVAPI32.dll::CryptAcquireContextW
ADVAPI32.dll::CryptCreateHash
ADVAPI32.dll::CryptGetHashParam
ADVAPI32.dll::CryptHashData
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryInfoKeyW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
WIN_SVC_APICan Manipulate Windows ServicesADVAPI32.dll::ChangeServiceConfigW
ADVAPI32.dll::ControlService
ADVAPI32.dll::OpenSCManagerW
ADVAPI32.dll::OpenServiceW
ADVAPI32.dll::QueryServiceConfigW
ADVAPI32.dll::QueryServiceStatus
WIN_USER_APIPerforms GUI ActionsUSER32.dll::PeekMessageW
USER32.dll::CreateWindowExW

Comments