MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 97ba4422534cfd514e9dff46d3fb40efeb33ed2ad0ab29dee8a312453049203d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkCloud


Vendor detections: 12


Intelligence 12 IOCs YARA 3 File information Comments

SHA256 hash: 97ba4422534cfd514e9dff46d3fb40efeb33ed2ad0ab29dee8a312453049203d
SHA3-384 hash: 63ff89c3b65062575664706d3d0a769cb32d43358d307c4c880c5b912ec3c8f67c3d3b4fcc28fbba7ed059fa803eab7e
SHA1 hash: 2d198951d904596d300933714f24acdcc796fe77
MD5 hash: e3f21a7a4a879db45f6e3feeb8d43c5e
humanhash: wisconsin-victor-moon-leopard
File name:PO_Scan Document.exe
Download: download sample
Signature DarkCloud
File size:443'526 bytes
First seen:2023-04-03 05:55:15 UTC
Last seen:2023-04-03 06:34:09 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 61259b55b8912888e90f516ca08dc514 (1'059 x Formbook, 741 x AgentTesla, 427 x GuLoader)
ssdeep 6144:vYa6T3YS/vfoY2wXVVfY5Pv8wsD9QkiF2VIBn1AyxhOiMshL3Qlk1OkoyoV3OCcn:vY5XswlVfmPs+ktIB1T7vhhn4Fr+CYt
Threatray 41 similar samples on MalwareBazaar
TLSH T1B19422487AF5D5F3E2F27E3166BA63776B6EC93605A49A0EA740070CB5276030C0F75A
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter adrian__luca
Tags:DarkCloud exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
232
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PO_Scan Document.exe
Verdict:
Malicious activity
Analysis date:
2023-04-03 06:00:22 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Sending a custom TCP request
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
comodo nemesis overlay packed remcos shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample has a suspicious name (potential lure to open the executable)
Tries to harvest and steal browser information (history, passwords, etc)
Writes or reads registry keys via WMI
Yara detected Generic Dropper
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Nemesis
Status:
Malicious
First seen:
2023-03-29 12:00:48 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
29 of 37 (78.38%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Executes dropped EXE
Loads dropped DLL
Unpacked files
SH256 hash:
3b75425895af4ae3186b36277553641e37ca1d620ae18d68e40d13351b54de6a
MD5 hash:
94d1531b52774dce52a89e33646d5b1d
SHA1 hash:
29bf887b025b97bd7a9e1e261852ba824234a625
SH256 hash:
f7756f63cf16c4e8e7234a896e37dae4c09158b114dc2b65ccec29da4f9bd841
MD5 hash:
629f6be4dadb8da09cc75a4d0dde7d8c
SHA1 hash:
7b3ab3fef3aa3b395d3815886b4c717c5f5b2c69
SH256 hash:
6078aaec77239e228fc1bdb7b5c15e4ebd78b03c8905fe2b9aee2b9edac52247
MD5 hash:
2734f85c7824ff0cc4174e3420fd13be
SHA1 hash:
655439976de7158592eb74a030b2542219231390
SH256 hash:
97ba4422534cfd514e9dff46d3fb40efeb33ed2ad0ab29dee8a312453049203d
MD5 hash:
e3f21a7a4a879db45f6e3feeb8d43c5e
SHA1 hash:
2d198951d904596d300933714f24acdcc796fe77
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_TelegramChatBot
Author:ditekSHen
Description:Detects executables using Telegram Chat Bot
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Suspicious_Macro_Presence
Author:Mehmet Ali Kerimoglu (CYB3RMX)
Description:This rule detects common malicious/suspicious implementations.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

DarkCloud

Executable exe 97ba4422534cfd514e9dff46d3fb40efeb33ed2ad0ab29dee8a312453049203d

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments