MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 94b06e33dfece175f9a41ecf6e1ae4aefbe23ec591e8302eeadf8bbe26f23354. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 94b06e33dfece175f9a41ecf6e1ae4aefbe23ec591e8302eeadf8bbe26f23354
SHA3-384 hash: 9fb56b837ac707c155832ebbf2ac761d4df5bf42453127bb5ccb0a9590960de692277ec5d5d140d9ffbdbc278c9e0421
SHA1 hash: e73654985f077e8bd265d7384e83b04a0d15eebd
MD5 hash: 5d5510ef10afe726db57b34e8c731f93
humanhash: thirteen-potato-maryland-princess
File name:5d5510ef10afe726db57b34e8c731f93
Download: download sample
File size:1'829'182 bytes
First seen:2022-01-12 04:58:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 1ff847646487d56f85778df99ff3728a (4 x RedLineStealer, 3 x Nitol, 2 x Gh0stRAT)
ssdeep 49152:WC2lJmXbj5DIwbQea1LPEyK7r385JD3d6cIWho:WzlkbFDVrQMyOr3S3d6cLho
TLSH T142851203B293C072D49901B505658BB64F3A7C319775D0F7AFD13AAA9D703E29B3638A
File icon (PE):PE icon
dhash icon fadadac2a2b8c4e4 (11 x Nitol, 2 x Amadey, 2 x AgentTesla)
Reporter Anonymous
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
197
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
5d5510ef10afe726db57b34e8c731f93
Verdict:
Malicious activity
Analysis date:
2022-01-12 04:39:14 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Searching for synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Searching for the window
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj
Score:
60 / 100
Signature
Antivirus / Scanner detection for submitted sample
Connects to a pastebin service (likely for C&C)
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Bingoml
Status:
Malicious
First seen:
2021-06-22 04:55:26 UTC
File Type:
PE (Exe)
Extracted files:
21
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Legitimate hosting services abused for malware hosting/C2
Loads dropped DLL
Executes dropped EXE
UPX packed file
Unpacked files
SH256 hash:
c5c3eb65c047c68c08dcf2fe51286c44fdc5d16238b8f8d65c3ae68cf25421ba
MD5 hash:
20a3091748a33b17ad060aad5dba1f21
SHA1 hash:
c962d7f2bf14d2006de489137117666e85ccd779
SH256 hash:
c3f051fdc89bba65156a1f0b0c6bcd9dd7950ff851ed8338e842ad1d89534c48
MD5 hash:
6e8174db90c85a6c871510c2ec49c3f9
SHA1 hash:
01d1ea3fceaae1eef1034e230c1924eba645a7ee
SH256 hash:
94b06e33dfece175f9a41ecf6e1ae4aefbe23ec591e8302eeadf8bbe26f23354
MD5 hash:
5d5510ef10afe726db57b34e8c731f93
SHA1 hash:
e73654985f077e8bd265d7384e83b04a0d15eebd
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments