MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 945e75769edd017d803517059513bc0eaf2d06ae35d1b62a484148609acd5d61. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 3
| SHA256 hash: | 945e75769edd017d803517059513bc0eaf2d06ae35d1b62a484148609acd5d61 |
|---|---|
| SHA3-384 hash: | 650eda9d10adae97b824f17e8d91a35f82440d895f9de7e511cb24175a74f9e3dc00e24eaf429c9d4b06b9aa21f335b3 |
| SHA1 hash: | d344be0f968a20614487c5c4215673a6a0b48092 |
| MD5 hash: | a0979669ace4bd037e3fab99d114fd79 |
| humanhash: | winner-moon-gee-florida |
| File name: | a0979669ace4bd037e3fab99d114fd79 |
| Download: | download sample |
| File size: | 212'992 bytes |
| First seen: | 2020-11-17 11:55:49 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 03ae0108c7455c49c94d2d60afa1e57a (1 x Worm.Ramnit) |
| ssdeep | 3072:gW9CO41zW5pZJ5p50uvq2WKW9FYx+z1Sasdjr2zMYeCoZ398O4pLthEjQT6j:giyz+vqftY8kaeH2QYepZ3SOkEj1 |
| Threatray | 129 similar samples on MalwareBazaar |
| TLSH | 7E248E197569C416E0A742744CCACB3C2D79BCA17791CB6F3E48B38D28B1398CAB6753 |
| Reporter |
Intelligence
File Origin
# of uploads :
1
# of downloads :
53
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Creating a file in the Windows subdirectories
Running batch commands
Creating a process with a hidden window
Launching the default Windows debugger (dwwin.exe)
Creating a process from a recently created file
Sending a UDP request
Creating a file in the Windows directory
Threat name:
Win32.Trojan.Aenjaris
Status:
Malicious
First seen:
2020-11-08 07:05:00 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
5/5
Verdict:
unknown
Similar samples:
+ 119 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Program crash
Drops file in Windows directory
Loads dropped DLL
Executes dropped EXE
ServiceHost packer
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
945e75769edd017d803517059513bc0eaf2d06ae35d1b62a484148609acd5d61
MD5 hash:
a0979669ace4bd037e3fab99d114fd79
SHA1 hash:
d344be0f968a20614487c5c4215673a6a0b48092
SH256 hash:
110c5b3497626df998223ecb0fc1bc7acadd1a070225e95c88f5f19ff0169e5e
MD5 hash:
eb167021b85678176b14ac70056997b0
SHA1 hash:
5316584fe3a38cb66ab7f54e411905908bfbcb94
SH256 hash:
e282566c5a3f1c81f26f7234c85b60186e04c4a74b505551d1ab4a8a2546a4d3
MD5 hash:
5d74f3ddd2c63a2113cbed45673cfb7b
SHA1 hash:
1fc09d5a92b5a04d7ed21930916ffc3dd7e20263
SH256 hash:
683e791233758f2cc9d210a0c9ce135bf53c75863fb749e3f74ba3e09c90a227
MD5 hash:
4aab58be011ea9aade2ece91763cd851
SHA1 hash:
05b8620148af8c6b389f9c9e74a4fe571cf54f95
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Delivery method
Other
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.