MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9f97fdeaa2c81fac2afb2a94616144c0773b5bec316ebc114c8d134eccd84cdc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments 1

SHA256 hash: 9f97fdeaa2c81fac2afb2a94616144c0773b5bec316ebc114c8d134eccd84cdc
SHA3-384 hash: Calculating hash
SHA1 hash: Calculating hash
MD5 hash: e79ffcc3a1d0bfa117f04fda77b2bfec
humanhash: Calculating hash
File name:e79ffcc3a1d0bfa117f04fda77b2bfec
Download: download sample
File size:3'560'903 bytes
First seen:2022-05-28 23:14:06 UTC
Last seen:2022-06-01 07:19:08 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash Calculating imphash
ssdeep Calculating ssdeep hash
Threatray 41 similar samples on MalwareBazaar
TLSH Calculating TLSH
telfhash Calculating telfhash
TrID 33.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
21.3% (.EXE) Win64 Executable (generic) (10523/12/4)
13.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.1% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter zbetcheckin
Tags:32 exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
483
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a401a80813d5151a8c25caa46ef63982.exe
Verdict:
Malicious activity
Analysis date:
2022-05-28 22:13:39 UTC
Tags:
loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Сreating synchronization primitives
Searching for the window
Creating a file in the %temp% directory
Creating a window
Changing a file
Query of malicious DNS domain
Unauthorized injection to a system process
Sending an HTTP GET request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug overlay packed spyeye vidar
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
rans.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Found Tor onion address
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 635562 Sample: XqXQUsLEe1 Startdate: 29/05/2022 Architecture: WINDOWS Score: 100 47 soapbeginshops.com 2->47 55 Multi AV Scanner detection for domain / URL 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 Antivirus detection for URL or domain 2->59 61 4 other signatures 2->61 11 XqXQUsLEe1.exe 1 2->11         started        signatures3 process4 signatures5 63 Writes to foreign memory regions 11->63 65 Allocates memory in foreign processes 11->65 67 Injects a PE file into a foreign processes 11->67 14 AppLaunch.exe 18 59 11->14         started        19 WerFault.exe 23 9 11->19         started        21 conhost.exe 11->21         started        process6 dnsIp7 49 soapbeginshops.com 34.118.86.4, 49751, 49764, 80 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 14->49 51 192.168.2.1 unknown unknown 14->51 37 C:\RCXB901.tmp, PE32 14->37 dropped 39 C:\RCXB518.tmp, PE32 14->39 dropped 41 C:\RCXB15E.tmp, PE32 14->41 dropped 45 47 other files (25 malicious) 14->45 dropped 53 Modifies existing user documents (likely ransomware behavior) 14->53 23 unarchiver.exe 5 14->23         started        43 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 19->43 dropped file8 signatures9 process10 process11 25 cmd.exe 2 23->25         started        27 7za.exe 2 23->27         started        process12 29 powershell.exe 19 25->29         started        31 conhost.exe 25->31         started        33 conhost.exe 27->33         started        process13 35 mshta.exe 29->35         started       
Gathering data
Gathering data
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Downloads MZ/PE file
Unpacked files
SH256 hash:
b2a54787ffa8aee827b7dca5be6c120c27637698274f318efc0c425ec94b8c20
MD5 hash:
a62cea69f3aa73b00a2e4e1aaedffc89
SHA1 hash:
18bb87b6d6597b5fb6e07d7d5a07634274cc3cdf
SH256 hash:
9f97fdeaa2c81fac2afb2a94616144c0773b5bec316ebc114c8d134eccd84cdc
MD5 hash:
e79ffcc3a1d0bfa117f04fda77b2bfec
SHA1 hash:
83aba440c3173f418c790b87c076503c16cd5c13
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 9f97fdeaa2c81fac2afb2a94616144c0773b5bec316ebc114c8d134eccd84cdc

(this sample)

Comments



Avatar
zbet commented on 2022-05-28 23:14:17 UTC

url : hxxp://49.12.240.242/kingz.exe