MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 987204ca82337f0a3f28097a5d66d5f3ecb11d43d82f67cd753d0bf2ce40b7a7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cutwail


Vendor detections: 13


Intelligence 13 IOCs YARA 3 File information Comments 1

SHA256 hash: 987204ca82337f0a3f28097a5d66d5f3ecb11d43d82f67cd753d0bf2ce40b7a7
SHA3-384 hash: 0c103207f116a96878054699cd98cc1bf27494e5f76f0c52e5db051c563fe49b24edecef41fbd6efe29b84287d26bd1e
SHA1 hash: 4fac3a2b3e76ee1b31a369ed53d145218952a340
MD5 hash: 9faea65cff61ad64e4bc4c3913c336be
humanhash: timing-lima-hot-dakota
File name:9faea65cff61ad64e4bc4c3913c336be
Download: download sample
Signature Cutwail
File size:259'072 bytes
First seen:2023-03-22 04:41:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6e82b26469ac662e23ea9fbbf84e95db (1 x Cutwail)
ssdeep 6144:UYf6pfKeeeeeeuPUn+AQTGTDFNDlzZID9+K7JPF:T6pieeeeeeupIDT7II0j
Threatray 15 similar samples on MalwareBazaar
TLSH T1C6444B18DE73AC75DCE304731052FE7AF1799E824B266B91F7849EBBE46286D70042D8
TrID 37.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
20.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
12.7% (.EXE) Win64 Executable (generic) (10523/12/4)
7.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon 78f8e0c2d288c9b2 (1 x Gozi, 1 x Cutwail)
Reporter zbetcheckin
Tags:32 Cutwail exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
254
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
9faea65cff61ad64e4bc4c3913c336be
Verdict:
Malicious activity
Analysis date:
2023-03-22 04:41:49 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Creating a file
Enabling the 'hidden' option for recently created files
DNS request
Sending an HTTP POST request
Launching a process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Sending an HTTP POST request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug anti-vm cutwail packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Drops PE files to the user root directory
Early bird code injection technique detected
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Send many emails (e-Mail Spam)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to resolve many domain names, but no domain seems valid
Writes to foreign memory regions
Yara detected Backdoor Pushdo
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 831928 Sample: 6gjnnBAbpc.exe Startdate: 22/03/2023 Architecture: WINDOWS Score: 100 67 oh28ya.com 2->67 69 magicomm.co.uk 2->69 71 346 other IPs or domains 2->71 107 Snort IDS alert for network traffic 2->107 109 Antivirus detection for URL or domain 2->109 111 Multi AV Scanner detection for submitted file 2->111 117 3 other signatures 2->117 8 6gjnnBAbpc.exe 3 68 2->8         started        13 pigalicapi.exe 48 2->13         started        15 pigalicapi.exe 48 2->15         started        signatures3 113 System process connects to network (likely due to code injection or exploit) 69->113 115 Tries to resolve many domain names, but no domain seems valid 69->115 process4 dnsIp5 81 201 other IPs or domains 8->81 49 C:\Users\user\pigalicapi.exe, PE32 8->49 dropped 51 C:\Users\...\pigalicapi.exe:Zone.Identifier, ASCII 8->51 dropped 119 Early bird code injection technique detected 8->119 121 Found stalling execution ending in API Sleep call 8->121 123 Contains functionality to inject threads in other processes 8->123 139 3 other signatures 8->139 17 svchost.exe 8->17         started        21 svchost.exe 8->21         started        73 nts-web.net 13->73 75 wolffkran.de 13->75 83 183 other IPs or domains 13->83 125 Multi AV Scanner detection for dropped file 13->125 127 Machine Learning detection for dropped file 13->127 129 Writes to foreign memory regions 13->129 131 Queues an APC in another process (thread injection) 13->131 23 svchost.exe 13->23         started        25 svchost.exe 13->25         started        77 www.medisa.info 15->77 79 www.kernsafe.com 15->79 85 170 other IPs or domains 15->85 133 Injects a PE file into a foreign processes 15->133 27 svchost.exe 15->27         started        file6 135 System process connects to network (likely due to code injection or exploit) 77->135 137 Tries to resolve many domain names, but no domain seems valid 79->137 signatures7 process8 dnsIp9 53 smtp1.sbc.mail.am0.yahoodns.net 17->53 59 5 other IPs or domains 17->59 103 System process connects to network (likely due to code injection or exploit) 17->103 105 Injects a PE file into a foreign processes 17->105 29 svchost.exe 12 17->29         started        33 svchost.exe 17->33         started        35 svchost.exe 17->35         started        37 svchost.exe 17->37         started        55 smtp.mail.global.gm0.yahoodns.net 21->55 61 2 other IPs or domains 21->61 63 8 other IPs or domains 23->63 39 svchost.exe 23->39         started        41 svchost.exe 23->41         started        43 svchost.exe 23->43         started        45 svchost.exe 23->45         started        57 samtv.ro 27->57 65 3 other IPs or domains 27->65 47 4 other processes 27->47 signatures10 process11 dnsIp12 87 86 other IPs or domains 29->87 141 System process connects to network (likely due to code injection or exploit) 29->141 89 100 other IPs or domains 33->89 91 114 other IPs or domains 35->91 93 304 other IPs or domains 37->93 95 57 other IPs or domains 39->95 97 67 other IPs or domains 41->97 99 54 other IPs or domains 43->99 101 38 other IPs or domains 45->101 signatures13
Threat name:
Win32.Trojan.Cutwail
Status:
Malicious
First seen:
2023-03-21 09:58:59 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
persistence upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
UPX packed file
Unpacked files
SH256 hash:
1398e6aec858444d06ed2a86e57c9ab8bcf607824888f502740471e223be7ac0
MD5 hash:
c7315635b3db4f8738a9647c48851dfc
SHA1 hash:
9c0e603ecdb11d1cf4ae8fad8811126fda753573
Detections:
win_pushdo_auto
SH256 hash:
f812cff25ac78391ad0621231aa8556d459a3cea3205a04b097744f1e0116a60
MD5 hash:
ab0fa68fdf4a67b3a404250f073e15ba
SHA1 hash:
7eb499acfbe7a3d4d536ab2de8e95be4d7234bbf
SH256 hash:
987204ca82337f0a3f28097a5d66d5f3ecb11d43d82f67cd753d0bf2ce40b7a7
MD5 hash:
9faea65cff61ad64e4bc4c3913c336be
SHA1 hash:
4fac3a2b3e76ee1b31a369ed53d145218952a340
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:win_pushdo_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.pushdo.
Rule name:yara_template

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Cutwail

Executable exe 987204ca82337f0a3f28097a5d66d5f3ecb11d43d82f67cd753d0bf2ce40b7a7

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-03-22 04:41:18 UTC

url : hxxp://h168121.srv21.test-hf.su/96.exe