MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9de786b803d8e271650197e128ab6d427e3e318424c13055b376d5c589f5f6e8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stop
Vendor detections: 15
| SHA256 hash: | 9de786b803d8e271650197e128ab6d427e3e318424c13055b376d5c589f5f6e8 |
|---|---|
| SHA3-384 hash: | da59dea8939dc7e251ccf4e26dd83ce99fbfdd505e8d1015826f387c780bf3c3557e40bf96cd85a94f3d8243f2297250 |
| SHA1 hash: | ad5d381abdc2d5579081e828f27fe46e7a021ede |
| MD5 hash: | 37061eb0a2324e03195e91ceec90f763 |
| humanhash: | aspen-sad-lake-quiet |
| File name: | 37061eb0a2324e03195e91ceec90f763.exe |
| Download: | download sample |
| Signature | Stop |
| File size: | 753'152 bytes |
| First seen: | 2022-08-26 05:45:46 UTC |
| Last seen: | 2022-08-26 06:35:27 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 763a60e7e84fbec8b9d580e13cafda9f (4 x RedLineStealer, 3 x Stop, 2 x RecordBreaker) |
| ssdeep | 12288:+8smKoMewePq1a4y9A07dsKd7UCF2eSnEJyF9U7a4R09aLgtK/7ywdsS5:+8OoMewePq1jy9AmOKd7UnMDR09cReX0 |
| TLSH | T10CF41210BAE39671E4AC4C3258A5DBED4B3B7C129274949BEBB45B4F1EB33C18671305 |
| TrID | 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 16.4% (.EXE) Win64 Executable (generic) (10523/12/4) 10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.0% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 480c1c4c4b590b14 (2 x Stop) |
| Reporter | |
| Tags: | exe Stop |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://78.47.130.133/ | https://threatfox.abuse.ch/ioc/845446/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
a1beb48067787bbbefceda7adf82e4531dedcda0f3a22be35524f65cce247728
9fd2e141a149704cc16f1d510980fa45433ec26ac370c7db856255261f65cb3b
e2f8b5fde2d9fbf61455d895af3040af26915d09714f0438e12337e44ee46f09
057c0db0601053a63938b908aa39a8e8d064c7cad1939db90d21964d002e58f9
9de786b803d8e271650197e128ab6d427e3e318424c13055b376d5c589f5f6e8
d7de2b447367f02e1038ee9acc477120a515cd2c2399b49749014ef3fdc37b03
93b32faac67ea996c0eb28c662d6132ec4e789633a040550d261b995bda0473f
e5b366c2c9fba8681a35fbe32a5adc6850baf0d11cb87c214eda5c255d66fb60
129745c0c4f0b6a973755bdade64b073a542f4e69e2c6744e6263b9d666927dc
0866b18606d78aee5f51c208774f974f31f59ad6eb54dc6f0c46b6eaa38e3f2e
970a7f3a8e1caf695dff4a62f2c9da51289f3eea0c7f534dcfcb6cd403f1684b
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | MALWARE_Win_STOP |
|---|---|
| Author: | ditekSHen |
| Description: | Detects STOP ransomware |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | SUSP_XORed_URL_in_EXE |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | SUSP_XORed_URL_in_EXE_RID2E46 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | win_stop_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.stop. |
| Rule name: | win_vidar_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.vidar. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.