MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9f2bfb93647496f466b54b7b5405db565fb23b51b71f0fd97d034b24113d4b93. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 4 File information Comments

SHA256 hash: 9f2bfb93647496f466b54b7b5405db565fb23b51b71f0fd97d034b24113d4b93
SHA3-384 hash: c757a8b143858195f09953166ffadfa6ee88eeebf910d34880da7ed9aa9e2c46a64d48fb547103122456cec1346fa45a
SHA1 hash: 2519ac8a1e4ed438cf3bff8b0be0b84125b1e02a
MD5 hash: fdcfa3aa61fe2ed1ee6967ca9824c427
humanhash: pennsylvania-enemy-wolfram-uncle
File name:c_test.exe
Download: download sample
File size:7'337'721 bytes
First seen:2024-01-04 06:54:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash bae3d3e8262d7ce7e9ee69cc1b630d3a (5 x Akira, 2 x DCRat, 1 x CrealStealer)
ssdeep 196608:xHure1W903eV4Q2tpDjIIAcwD0RPgvvk9LIL:+EW+eGQi9jo0Rk
TLSH T100763390A2D85EE4D9B2813F8A95805AE631BD221B78C68787F4A5933F333C58D3F751
TrID 66.5% (.EXE) InstallShield setup (43053/19/16)
16.2% (.EXE) Win64 Executable (generic) (10523/12/4)
7.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
3.1% (.EXE) OS/2 Executable (generic) (2029/13)
3.0% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon aebc385c4ce0e8f8 (10 x PythonStealer, 7 x RedLineStealer, 7 x DCRat)
Reporter jeck11512ss
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
413
Origin country :
TW TW
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Restart of the analyzed sample
Sending a custom TCP request
Verdict:
No Threat
Threat level:
  2.5/10
Confidence:
100%
Tags:
control expand lolbin overlay packed packed pyinstaller
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
clean
Classification:
n/a
Score:
9 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win64.Trojan.ScarletFlash
Status:
Malicious
First seen:
2024-01-04 06:55:13 UTC
File Type:
PE+ (Exe)
Extracted files:
293
AV detection:
3 of 23 (13.04%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
n/a
Score:
  7/10
Tags:
pyinstaller
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Loads dropped DLL
Unpacked files
SH256 hash:
9f2bfb93647496f466b54b7b5405db565fb23b51b71f0fd97d034b24113d4b93
MD5 hash:
fdcfa3aa61fe2ed1ee6967ca9824c427
SHA1 hash:
2519ac8a1e4ed438cf3bff8b0be0b84125b1e02a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:PyInstaller
Author:@bartblaze
Description:Identifies executable converted using PyInstaller.
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments