MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9f1052a754dc0ff5aa1689b68581b845996b9ee8cb94d4382ceebb0dfbaa0231. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



YoungLotus


Vendor detections: 9


Intelligence 9 IOCs YARA 2 File information Comments

SHA256 hash: 9f1052a754dc0ff5aa1689b68581b845996b9ee8cb94d4382ceebb0dfbaa0231
SHA3-384 hash: ad7e25fa552e0a04b6061188ec29b8ffce82e049d625a1c6728708de6f6a781d2e529fcbba7c2c6694fee6001e172882
SHA1 hash: 6ce416e7524588a5631e420f19a9f197256fb31e
MD5 hash: cc585b3f14bff2c778864c4e01d657f0
humanhash: arizona-lion-earth-black
File name:hpqhvsei.dll
Download: download sample
Signature YoungLotus
File size:228'864 bytes
First seen:2021-02-12 08:56:59 UTC
Last seen:2021-02-12 11:00:25 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 842bc552ea3a9e6155d8cad1323e5c22 (1 x YoungLotus)
ssdeep 6144:BE03dRoJCaTwtw1OuWlQTk3hy2LcQAQU:BE03diJCYwtTuWlqk3FjAQU
Threatray 13 similar samples on MalwareBazaar
TLSH 3F245B02A383FAECE95916F40D20B477C7BA6F20F6106992215C75745BBE9CD8F21BD2
Reporter r3dbU7z
Tags:dll younglotus

Intelligence


File Origin
# of uploads :
3
# of downloads :
126
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending an HTTP GET request
Creating a file in the Windows subdirectories
Deleting a recently created file
Connection attempt
Sending a UDP request
Replacing files
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
68 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Graftor
Status:
Malicious
First seen:
2020-07-04 20:09:29 UTC
AV detection:
16 of 28 (57.14%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Blocklisted process makes network request
Unpacked files
SH256 hash:
b53f932d1fa2c37b962461b1484f8020b21018c5b96961ebe643c09569aa78ba
MD5 hash:
14b8dce97aaa08648f51984999b384d4
SHA1 hash:
91fa464eec79111b555b36a141673b71f989d844
Detections:
win_younglotus_g0 win_younglotus_auto
SH256 hash:
9f1052a754dc0ff5aa1689b68581b845996b9ee8cb94d4382ceebb0dfbaa0231
MD5 hash:
cc585b3f14bff2c778864c4e01d657f0
SHA1 hash:
6ce416e7524588a5631e420f19a9f197256fb31e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:IPPort_combo_mem
Author:James_inthe_box
Description:IP and port combo
Rule name:win_younglotus_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments