MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 98ca9e1847d490b88b302a2ac2194c96edc593a3a1c7328b137deedb68dc1b8a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Banload


Vendor detections: 4


Intelligence 4 IOCs YARA 3 File information Comments

SHA256 hash: 98ca9e1847d490b88b302a2ac2194c96edc593a3a1c7328b137deedb68dc1b8a
SHA3-384 hash: 135df4882b9d099d89842bdb29e75a372a0c14ef7e842927adad0240bcdf28e50d38fabd0e4833ad887bdf4d3ba32797
SHA1 hash: 7b4196619611f520700cae041118c09f3b397e6e
MD5 hash: 736669d5d1dfa12937b76e6710152f68
humanhash: kansas-robert-sink-low
File name:banload.LNK
Download: download sample
Signature Banload
File size:534 bytes
First seen:2021-08-12 13:54:28 UTC
Last seen:Never
File type:Shortcut (lnk) lnk
MIME type:application/octet-stream
ssdeep 12:8rfl3OB+Dh4dWfgzrxRgqa9WJSQsMXr41OUeXz98+R:8HDhLIwp8Xr4q
TLSH T13DF05C64DF7861D6C418123AC143DF0C0CA1A08D8080D7357347F10D56E48C0AB8E5A2
Reporter warz_s
Tags:Astaroth Banload brazil guildma lnk

Intelligence


File Origin
# of uploads :
1
# of downloads :
1'813
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Threat name:
Shortcut.Trojan.Pantera
Status:
Malicious
First seen:
2021-08-12 13:55:13 UTC
AV detection:
10 of 46 (21.74%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Execution_in_LNK
Author:@bartblaze
Description:Identifies execution artefacts in shortcut (LNK) files.
Rule name:EXE_in_LNK
Author:@bartblaze
Description:Identifies executable artefacts in shortcut (LNK) files.
Rule name:PS_in_LNK
Author:@bartblaze
Description:Identifies PowerShell artefacts in shortcut (LNK) files.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

41ccb9bf09478670775bd2bc5bc4bf2470d6762478c976cf112b4994d4cbcb89

Banload

Shortcut (lnk) lnk 98ca9e1847d490b88b302a2ac2194c96edc593a3a1c7328b137deedb68dc1b8a

(this sample)

a489ad617f60733a24924b46be2441b4f46f6713e699ec9a44676e8f068e49a0

Comments