MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a056d4e826dffe5c356b3a62dc01ec7407f0fad2bea2bdbcb2438c9bf21f2c9f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stop
Vendor detections: 11
| SHA256 hash: | a056d4e826dffe5c356b3a62dc01ec7407f0fad2bea2bdbcb2438c9bf21f2c9f |
|---|---|
| SHA3-384 hash: | 2972fd2cefa02dc799344e7c8fed3e035a5d9e6923f4116f2c6dd111278507d03c8c1b331fd3c26e7f4c282db942744b |
| SHA1 hash: | 58371aa05b9169f157982134d557f443cb22f232 |
| MD5 hash: | a8e1d5f14e030652e40d5ca885752510 |
| humanhash: | monkey-fifteen-seven-red |
| File name: | a8e1d5f14e030652e40d5ca885752510.exe |
| Download: | download sample |
| Signature | Stop |
| File size: | 879'616 bytes |
| First seen: | 2021-06-17 06:49:58 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | a88bf0d4e011f8e1919dc00ad8d99f15 (1 x RedLineStealer, 1 x ArkeiStealer, 1 x Stop) |
| ssdeep | 12288:HL3x1cdS9Ik2+K09f/WV4DgN51Op/XK8QGpHsTfzNDpUl5lU7ZQNaiO4:rB1ff93DD64y8NHq165lKZQN3 |
| Threatray | 293 similar samples on MalwareBazaar |
| TLSH | 6B150200B690C034F9F722F56AB69379943D79B1676890CF93E526FA56389E0EC30357 |
| Reporter | |
| Tags: | exe Stop |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | MALWARE_Win_STOP |
|---|---|
| Author: | ditekSHen |
| Description: | Detects STOP ransomware |
| Rule name: | SUSP_XORed_URL_in_EXE |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.