MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9d2024f620b8fdd702e0db069c0c4764224c28d962157f7863b1d881ebe3682e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments 1

SHA256 hash: 9d2024f620b8fdd702e0db069c0c4764224c28d962157f7863b1d881ebe3682e
SHA3-384 hash: f329c444a2a4193b48f71595057067e1f4683467498ba382675cd8373c53fc5e5c65e413204d7043db2152a64c9cb74b
SHA1 hash: 2b51d8d6d7b71161fe59b55939e02c7cc54fabd1
MD5 hash: 08f4904f57a32dbf7c25a0418a8fe489
humanhash: texas-mirror-violet-sierra
File name:autohot_stage3.bin
Download: download sample
File size:1'044'480 bytes
First seen:2022-11-28 20:48:15 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 12288:K0RZ43bp03YQ2PqK3s8Ypw95I8ldM4WMlyPV+IVuBW9m:9RO3bpGMR883I5z9+U/9m
Threatray 975 similar samples on MalwareBazaar
TLSH T17A25F1037381823CE85E063A956FF7700B69AC249EF58A52BF847E5C1D74190A6F7DA3
TrID 80.0% (.MSI) Microsoft Windows Installer (454500/1/170)
10.7% (.MST) Windows SDK Setup Transform script (61000/1/5)
7.8% (.MSP) Windows Installer Patch (44509/10/5)
1.4% (.) Generic OLE2 / Multistream Compound (8000/1)
Reporter Anonymous
Tags:msi

Intelligence


File Origin
# of uploads :
1
# of downloads :
137
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spre.evad
Score:
48 / 100
Signature
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Sample or dropped binary is a compiled AutoHotkey binary
Yara detected AutoHotkey Downloader
Behaviour
Behavior Graph:
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Enumerates connected drives
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
evanchristo commented on 2022-11-29 07:49:54 UTC

I someone is using a minecraft autokey tool to spread malware basically