MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9f1bd2c46d3293044a04b58c4f9fdbe301cf6d2d5432c808b7e7310fe4544011. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 9f1bd2c46d3293044a04b58c4f9fdbe301cf6d2d5432c808b7e7310fe4544011
SHA3-384 hash: 510d651e0a56a502e6a424ce1de4d71e4b9f15af90c97bf523c18945cd7023c891932d1475f27edd9d839e6938b66f7b
SHA1 hash: e4a6d43fa1b6337e08a7f41b905435169396703a
MD5 hash: 5ec99b3d05c4570112e799e6daf87d95
humanhash: harry-november-cola-mobile
File name:kredit št. LD202011004·pdf.exe
Download: download sample
File size:900'608 bytes
First seen:2020-11-05 09:43:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e84ad2fcdc8258e8b185201ca744213f
ssdeep 24576:sQTCo386FXokHD18aTnVVMMY6LkZpxQAM4w:se1htRJI6gDxQyw
Threatray 69 similar samples on MalwareBazaar
TLSH 51159E26F2B04837D1B3263F8C0B93A59826BE713D38594A3BE51E7C5F3968178252D7
Reporter abuse_ch
Tags:exe geo SVN


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: genoson.ml
Sending IP: 5.189.220.131
From: Klovar Suzana[NLB] <admin@genoson.ml>
Reply-To: Klovar Suzana[NLB] <Suzana.Klova@nlb.si>
Subject: obvestilo o plačilu za dobropis št. LD04202011
Attachment: kredit št. LD202011004·pdf.zip (contains "kredit št. LD202011004·pdf.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
88
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Changing a file
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
56 / 100
Signature
Contains functionality to detect sleep reduction / modifications
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Malrep
Status:
Malicious
First seen:
2020-11-05 03:47:22 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Modifies registry class
Unpacked files
SH256 hash:
9f1bd2c46d3293044a04b58c4f9fdbe301cf6d2d5432c808b7e7310fe4544011
MD5 hash:
5ec99b3d05c4570112e799e6daf87d95
SHA1 hash:
e4a6d43fa1b6337e08a7f41b905435169396703a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe 9f1bd2c46d3293044a04b58c4f9fdbe301cf6d2d5432c808b7e7310fe4544011

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments