MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 98041f1d954b2448a86fb228caacd5864d3f355b5cef78a14d3716ef2090efd9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 98041f1d954b2448a86fb228caacd5864d3f355b5cef78a14d3716ef2090efd9
SHA3-384 hash: 043f8d5700ec005869d4e30d507df1355f7fb4acf08db428a6fa79ac6d64a03cfc75d93c070a1723ac0b5ae47fd9ad96
SHA1 hash: 51dda4d5236eb7d70f28d48f22e5b3ba29d88009
MD5 hash: 6bac0ec214fff2871ddae38a5d6c5b83
humanhash: connecticut-item-lamp-angel
File name:6bac0ec214fff2871ddae38a5d6c5b83.exe
Download: download sample
File size:380'416 bytes
First seen:2021-10-07 16:41:00 UTC
Last seen:2021-10-07 18:13:18 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c1d211268d6c769cc59ffca0e56e63c9 (5 x RaccoonStealer, 1 x ArkeiStealer, 1 x DanaBot)
ssdeep 6144:SyZ8hOkt6d9RnbgMEQrReLwpsSU4JSHpe2lyyK5+270a4lhplr9y:pdfbLrRJsGge2lyyK5+27Elh1y
Threatray 6'035 similar samples on MalwareBazaar
TLSH T1C984CF00BBA0C035F5F652B8097993B8B53F7EA16B39D4CB62D516EA46346E4EC3170B
File icon (PE):PE icon
dhash icon e0f8e8e8aa62a489 (2 x RedLineStealer, 1 x ArkeiStealer)
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
303
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
6bac0ec214fff2871ddae38a5d6c5b83.exe
Verdict:
No threats detected
Analysis date:
2021-10-07 17:09:38 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
n/a
Score:
24 / 100
Signature
Machine Learning detection for sample
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 499009 Sample: EYY6ZnKipB.exe Startdate: 07/10/2021 Architecture: WINDOWS Score: 24 15 Machine Learning detection for sample 2->15 6 EYY6ZnKipB.exe 1 2->6         started        process3 process4 8 WerFault.exe 23 9 6->8         started        11 conhost.exe 6->11         started        file5 13 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 8->13 dropped
Threat name:
Win32.Trojan.Racealer
Status:
Malicious
First seen:
2021-10-07 16:41:07 UTC
AV detection:
13 of 28 (46.43%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
d930a9b63eb055d958a2a748c7771c50e575e631fe1623646fee985a71ccf6bf
MD5 hash:
fa42eee212f375773d6fe8155429124d
SHA1 hash:
c2d49d1cf3180a3a270411bbaaae4e1395e7e162
SH256 hash:
98041f1d954b2448a86fb228caacd5864d3f355b5cef78a14d3716ef2090efd9
MD5 hash:
6bac0ec214fff2871ddae38a5d6c5b83
SHA1 hash:
51dda4d5236eb7d70f28d48f22e5b3ba29d88009
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 98041f1d954b2448a86fb228caacd5864d3f355b5cef78a14d3716ef2090efd9

(this sample)

  
Delivery method
Distributed via web download

Comments