MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a02258ba10419bc678e832f3224dc6340e22f567f7b8ba1d344a5e5213d129a1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



KeyBase


Vendor detections: 5


Intelligence 5 IOCs YARA 4 File information Comments

SHA256 hash: a02258ba10419bc678e832f3224dc6340e22f567f7b8ba1d344a5e5213d129a1
SHA3-384 hash: 99b63a81320a7be41a47df52767e0eebfc2536da1ca1ad3a0fe6cca5e03b8bc07fcad6cf4243d5353def18deca861cf9
SHA1 hash: a8faaa3a4a32aa561ae6e56e1f0ac915faf868b6
MD5 hash: 9df29e8497f08ab537996ee90017ee8a
humanhash: juliet-social-green-east
File name:SA Covid-19 Funding Connection.xlsm
Download: download sample
Signature KeyBase
File size:407'955 bytes
First seen:2020-08-08 18:01:45 UTC
Last seen:2020-08-08 18:55:20 UTC
File type:Excel file xlsm
MIME type:application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
ssdeep 12288:y1966HyQnGJhJrpY3o3XkYcuqvqSjMjYuWZmon:y19bXuhrYbLvzQsson
TLSH 7C8423BB60197DA6DAFFD8ADC40898E6300EC7253349AFFD694949C08D9B03D466D4CE
Reporter abuse_ch
Tags:COVID-19 KeyBase xlsm


Avatar
abuse_ch
Malspam distributing KeyBase:

HELO: centauro.inicia.es
Sending IP: 212.166.70.235
From: FUNDING CONNECTION <info@fundingconnection.co.za>
Subject: COVID-19 RELIEF FUNDING
Attachment: SA Covid-19 Funding Connection.xlsm

Keybase payload URL:
http://shopphongtinh.com/invoice.exe

KeyBase C2:
http://shopphongtinh.com/key/panel/base/post.php

Intelligence


File Origin
# of uploads :
2
# of downloads :
142
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a window
DNS request
Creating a file
Sending an HTTP GET request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
phis.troj.spyw.expl.evad
Score:
100 / 100
Signature
Contains functionality to log keystrokes (.Net Source)
Document exploit detected (creates forbidden files)
Document exploit detected (drops PE files)
Document exploit detected (process start blacklist hit)
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Office process drops PE file
Passes username and password via HTTP get
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Executables Started in Suspicious Folder
Sigma detected: Execution in Non-Executable Folder
Sigma detected: MS Office Product Spawning Exe in User Dir
Sigma detected: Scheduled temp file as task from temp location
Sigma detected: Suspicious Program Location Process Starts
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to steal Instant Messenger accounts or passwords
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM_3
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 260202 Sample: SA Covid-19 Funding Connect... Startdate: 08/08/2020 Architecture: WINDOWS Score: 100 41 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 Sigma detected: Scheduled temp file as task from temp location 2->45 47 14 other signatures 2->47 8 EXCEL.EXE 24 35 2->8         started        process3 dnsIp4 39 shopphongtinh.com 202.92.6.10, 49728, 49737, 49738 VNPT-AS-VNVNPTCorpVN Viet Nam 8->39 25 C:\Users\user\AppData\...\invoice[1].exe, PE32 8->25 dropped 27 C:\Users\Public\svchost32.exe, PE32 8->27 dropped 29 C:\...\~$SA Covid-19 Funding Connection.xlsm, data 8->29 dropped 53 Document exploit detected (creates forbidden files) 8->53 55 Document exploit detected (process start blacklist hit) 8->55 13 svchost32.exe 6 8->13         started        file5 signatures6 process7 file8 31 C:\Users\user\AppData\...\PUOqDhLQqLKID.exe, PE32 13->31 dropped 33 C:\Users\user\AppData\Local\...\tmp3685.tmp, XML 13->33 dropped 57 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 13->57 59 Machine Learning detection for dropped file 13->59 61 Injects a PE file into a foreign processes 13->61 17 svchost32.exe 15 2 13->17         started        21 schtasks.exe 1 13->21         started        signatures9 process10 dnsIp11 35 shopphongtinh.com 17->35 37 192.168.2.1 unknown unknown 17->37 49 Tries to steal Instant Messenger accounts or passwords 17->49 51 Installs a global keyboard hook 17->51 23 conhost.exe 21->23         started        signatures12 process13
Threat name:
Script-Macro.Trojan.Heuristic
Status:
Malicious
First seen:
2020-08-08 18:03:12 UTC
AV detection:
6 of 48 (12.50%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
evasion
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetWindowsHookEx
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: GetForegroundWindowSpam
Creates scheduled task(s)
Suspicious behavior: AddClipboardFormatListener
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Checks processor information in registry
Suspicious behavior: GetForegroundWindowSpam
Creates scheduled task(s)
Suspicious use of SetWindowsHookEx
Enumerates system info in registry
Office loads VBA resources, possible macro or embedded object present
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Maps connected drives based on registry
Maps connected drives based on registry
Checks BIOS information in registry
Checks BIOS information in registry
Executes dropped EXE
Looks for VMWare Tools registry key
Looks for VMWare Tools registry key
Executes dropped EXE
Looks for VirtualBox Guest Additions in registry
Looks for VirtualBox Guest Additions in registry
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:KeyBase
Author:@bartblaze
Description:Identifies KeyBase aka Kibex.
Rule name:MALW_KeyBase
Author:@bartblaze
Description:Identifies KeyBase aka Kibex.
Rule name:SharedStrings
Author:Katie Kleemola
Description:Internal names found in LURK0/CCTV0 samples
Rule name:win_keybase_w0
Author:@bartblaze
Description:Identifies KeyBase aka Kibex.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

KeyBase

Excel file xlsm a02258ba10419bc678e832f3224dc6340e22f567f7b8ba1d344a5e5213d129a1

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments