MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9733092223c428fc0e44a90b01c7f77a97bb1205def8be1224ac68969182638e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Worm.m0yv


Vendor detections: 14


Intelligence 14 IOCs YARA 10 File information Comments

SHA256 hash: 9733092223c428fc0e44a90b01c7f77a97bb1205def8be1224ac68969182638e
SHA3-384 hash: 7295266b098f0296019b33dcb2c1c20c5a95a8cfa22f6c37a47cdcf583a7bdd4fd112f71f4b015d7a098c95710384208
SHA1 hash: cf05bb575eb36a2987ca89f0b60633ca6c3c92db
MD5 hash: f954f24e6eb85ef1b64e315491dad816
humanhash: romeo-oklahoma-pluto-mexico
File name:9733092223c428fc0e44a90b01c7f77a97bb1205def8be1224ac68969182638e
Download: download sample
Signature Worm.m0yv
File size:631'808 bytes
First seen:2025-02-14 08:37:21 UTC
Last seen:2025-06-25 07:56:08 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6ed4f5f04d62b18d96b26d6db7c18840 (235 x SalatStealer, 78 x BitRAT, 42 x RedLineStealer)
ssdeep 12288:g2Nzj9CqY8xewVHK6RgIZOWzxZqfny+LSe5/9qRA8YAC88iA0QWNtM:gmA8xNqPIDnITSe5/9jSC8A0LE
TLSH T1AAD4237A02D8B095C1BB25B38983A0F14DE0DDFCD444D39AD521F22ED0BA9BD7D7A099
TrID 33.6% (.EXE) OS/2 Executable (generic) (2029/13)
33.1% (.EXE) Generic Win/DOS Executable (2002/3)
33.1% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter TheRavenFile
Tags:exe lockbit lockbit4 lockbit4.0 Ransomware Worm.m0yv


Avatar
RakeshKrish12
Source: https://github.com/TheRavenFile/Daily-Hunt/blob/main/LockBit%204.0%20Ransomware

Intelligence


File Origin
# of uploads :
2
# of downloads :
806
Origin country :
IN IN
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
9733092223c428fc0e44a90b01c7f77a97bb1205def8be1224ac68969182638e
Verdict:
Malicious activity
Analysis date:
2025-02-14 08:40:05 UTC
Tags:
sinkhole m0yv ransomware stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
ransomware expiro crypt blic
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
Moving a file to the Program Files directory
Moving a file to the Program Files subdirectory
Modifies multiple files
Creating a window
Using the Windows Management Instrumentation requests
Replacing files
Modifying a system file
Creating a file in the %temp% directory
Creating a file in the %AppData% subdirectories
Replacing executable files
Сreating synchronization primitives
Creating a file in the %AppData% directory
Modifying an executable file
Launching a service
Connection attempt to an infection source
Creating a file in the Windows subdirectories
Searching for synchronization primitives
Modifying a system executable file
Launching a process
Loading a system driver
Creating a file
Changing a file
Creating a file in the Program Files directory
Creating a file in the Program Files subdirectories
Enabling autorun for a service
Query of malicious DNS domain
Moving of the original file
Creating a file in the mass storage device
Infecting executable files
Sending an HTTP POST request to an infection source
Encrypting user's files
Enabling autorun by creating a file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
obfuscated packed packed packed packer_detected upx
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
LockBit ransomware
Detection:
malicious
Classification:
rans.spre.troj.expl.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Contains functionality to behave differently if execute on a Russian/Kazak computer
Creates / moves files in alternative data streams (ADS)
Creates files inside the volume driver (system volume information)
Deletes itself after installation
Drops executable to a common third party application directory
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after checking computer name)
Found evasive API chain (may stop execution after checking volume information)
Found ransom note / readme
Found Tor onion address
Infects executable files (exe, dll, sys, html)
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries random domain names (often used to prevent blacklisting and sinkholes)
Suricata IDS alerts for network traffic
Writes a notice file (html or txt) to demand a ransom
Writes many files with high entropy
Yara detected LockBit ransomware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1614920 Sample: QWKIi2utSz.exe Startdate: 14/02/2025 Architecture: WINDOWS Score: 100 29 zlenh.biz 2->29 31 yunalwv.biz 2->31 33 33 other IPs or domains 2->33 41 Suricata IDS alerts for network traffic 2->41 43 Antivirus detection for URL or domain 2->43 45 Antivirus detection for dropped file 2->45 47 8 other signatures 2->47 6 QWKIi2utSz.exe 1001 2->6         started        11 armsvc.exe 1 2->11         started        13 perfhost.exe 2->13         started        15 19 other processes 2->15 signatures3 process4 dnsIp5 35 192.168.2.100 unknown unknown 6->35 37 192.168.2.101 unknown unknown 6->37 39 98 other IPs or domains 6->39 17 C:\Windows\System32\msiexec.exe, PE32+ 6->17 dropped 19 WordR_Retail-ul-oob.xrm-ms.1df0ee919fe9, DOS 6->19 dropped 21 C:\...\rt.jar.b18537e7dd8f, COM 6->21 dropped 27 199 other malicious files 6->27 dropped 49 Connects to many different private IPs via SMB (likely to spread or exploit) 6->49 51 Connects to many different private IPs (likely to spread or exploit) 6->51 53 Creates / moves files in alternative data streams (ADS) 6->53 65 5 other signatures 6->65 23 C:\Windows\System32\sppsvc.exe, PE32+ 11->23 dropped 25 C:\Program Files (x86)\...\msoasb.exe, PE32 11->25 dropped 55 Infects executable files (exe, dll, sys, html) 11->55 57 Found evasive API chain (may stop execution after checking volume information) 13->57 59 Found evasive API chain (may stop execution after checking computer name) 13->59 61 Creates files inside the volume driver (system volume information) 15->61 63 Contains functionality to behave differently if execute on a Russian/Kazak computer 15->63 file6 signatures7
Threat name:
Win64.Virus.Expiro
Status:
Malicious
First seen:
2025-02-14 08:38:09 UTC
File Type:
PE+ (Exe)
AV detection:
26 of 37 (70.27%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
credential_access discovery spyware stealer upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy WMI provider
Uses Volume Shadow Copy service COM API
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
UPX packed file
Enumerates connected drives
Credentials from Password Stores: Windows Credential Manager
Deletes itself
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Verdict:
Malicious
Tags:
trojan expiro
YARA:
SUSP_Imphash_Mar23_3
Unpacked files
SH256 hash:
9733092223c428fc0e44a90b01c7f77a97bb1205def8be1224ac68969182638e
MD5 hash:
f954f24e6eb85ef1b64e315491dad816
SHA1 hash:
cf05bb575eb36a2987ca89f0b60633ca6c3c92db
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:SUSP_Imphash_Mar23_3
Author:Arnim Rupp (https://github.com/ruppde)
Description:Detects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits
Reference:Internal Research
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:Windows_Generic_Threat_ebf62328
Author:Elastic Security
Rule name:win_m0yv_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.m0yv.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN_BASE_APIUses Win Base APIKERNEL32.DLL::LoadLibraryA

Comments