MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 975f119696a3cf3411a68cc50d1afc1139b4c742e537e1c79077e07017a0b2dd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 975f119696a3cf3411a68cc50d1afc1139b4c742e537e1c79077e07017a0b2dd
SHA3-384 hash: b18931890bc01a4db3b3c61410ab2163cec8a97ab329c406c5189f3fd823561e7b2b251eef8bc122b065de15f6aa4bb7
SHA1 hash: e1134e39f8f176a11f46d0a6fb3cd8fc68186db3
MD5 hash: 3e14efa75d3df31f019918c46c55ae6b
humanhash: maine-alpha-yankee-pip
File name:WinRAR.exe
Download: download sample
File size:1'980'143 bytes
First seen:2022-03-10 04:38:21 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 8066c16c838a608909d3b67f238a0b60 (1 x CryptOne)
ssdeep 49152:q2B3FBfJXAEFrgMBWR+nictVGN2rJe3uBPULHk:q2B3FBfKEFrginic+WRBULHk
Threatray 5 similar samples on MalwareBazaar
TLSH T189950284BFC48CA9E9651479CB601B5CD89CFC63BFE946CE5360C92BE8E10C2193B56D
File icon (PE):PE icon
dhash icon b3b3b371716b93b3 (25 x CryptOne, 12 x RemcosRAT, 6 x RedLineStealer)
Reporter adm1n_usa32
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
201
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
WinRAR.exe
Verdict:
Malicious activity
Analysis date:
2022-03-10 04:29:06 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% directory
Launching a process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware meterpreter overlay packed setupapi.dll shdocvw.dll shell32.dll update.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
64 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Regsvr32 Command Line Without DLL
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Qshell
Status:
Malicious
First seen:
2022-03-03 05:01:56 UTC
File Type:
PE (Exe)
Extracted files:
18
AV detection:
23 of 42 (54.76%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Loads dropped DLL
Unpacked files
SH256 hash:
975f119696a3cf3411a68cc50d1afc1139b4c742e537e1c79077e07017a0b2dd
MD5 hash:
3e14efa75d3df31f019918c46c55ae6b
SHA1 hash:
e1134e39f8f176a11f46d0a6fb3cd8fc68186db3
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments