MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9adff4059d356db005f2dff33244f4d79ae75c4548c5ce25f72e084704df7308. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 11 File information Comments

SHA256 hash: 9adff4059d356db005f2dff33244f4d79ae75c4548c5ce25f72e084704df7308
SHA3-384 hash: 95f03b842d2d1c86fa0a41cd05ff01af4a3a0069cded7bd5e06036df062720f2774950ca94a344634cceae211a8261a4
SHA1 hash: bf1d9845d77f0f72bf8fea88786f684dd2841fd5
MD5 hash: debb0f691eaf08c9d815296fca132e19
humanhash: september-missouri-alanine-early
File name:SecuriteInfo.com.W64.Discord.I.gen.Eldorado.11052.14967
Download: download sample
File size:8'119'296 bytes
First seen:2022-12-11 05:28:27 UTC
Last seen:2022-12-11 06:26:50 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9cbefe68f395e67356e2a5d8d1b285c0 (60 x LummaStealer, 49 x AuroraStealer, 45 x Vidar)
ssdeep 98304:Z+3ILDhfyDETMn623fQGvHCtYcoXgo5ndT3q7p1OkLuroo2:ZcILDF4hCrZog7Oi
Threatray 26 similar samples on MalwareBazaar
TLSH T1F1868D03F894A5A4C6E9D2308935D2927671BC880B3137D72B50FBBA2B777C46E79394
gimphash 07ed5844a46b50f314fabd9c8f5ca3d76cda5e93cead61a4593451c04803b1ad
TrID 48.7% (.EXE) Win64 Executable (generic) (10523/12/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Reporter SecuriteInfoCom
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
173
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
DNS request
Creating a file in the %temp% directory
Running batch commands
Launching cmd.exe command interpreter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-vm anti-vm evasive fingerprint golang greyware packed
Result
Verdict:
MALICIOUS
Malware family:
ngrok-server
Verdict:
Suspicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2022-12-11 05:29:12 UTC
File Type:
PE+ (Exe)
AV detection:
9 of 26 (34.62%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Program crash
Blocklisted process makes network request
Unpacked files
SH256 hash:
9adff4059d356db005f2dff33244f4d79ae75c4548c5ce25f72e084704df7308
MD5 hash:
debb0f691eaf08c9d815296fca132e19
SHA1 hash:
bf1d9845d77f0f72bf8fea88786f684dd2841fd5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:GoBinTest
Rule name:golang
Rule name:Golangmalware
Author:Dhanunjaya
Description:Malware in Golang
Rule name:golang_bin
Author:Jonathan Cole
Rule name:golang_binary_string
Description:Golang strings present
Rule name:go_binary
Rule name:HiveRansomware
Author:Dhanunjaya
Description:Yara Rule To Detect Hive V4 Ransomware
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:INDICATOR_SUSPICIOUS_VM_Evasion_MACAddrComb
Author:ditekSHen
Description:Detects executables referencing virtualization MAC addresses
Rule name:INDICATOR_SUSPICIOUS_VM_Evasion_VirtDrvComb
Author:ditekSHen
Description:Detects executables referencing combination of virtualization drivers

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 9adff4059d356db005f2dff33244f4d79ae75c4548c5ce25f72e084704df7308

(this sample)

  
Delivery method
Distributed via web download

Comments