MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a0755055fec6800ed05b9f1c5c1a997a279a6b992a0eca4b0dc3789120ac4ad3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 12
| SHA256 hash: | a0755055fec6800ed05b9f1c5c1a997a279a6b992a0eca4b0dc3789120ac4ad3 |
|---|---|
| SHA3-384 hash: | 723d4fca63b030910ddbde855c1385a02643a9beb2ee557a5e0ce216d07d8e8144ebf06b6bef3b9e6211da9985f24c60 |
| SHA1 hash: | 8d280a5abede4d4cfb2017ace6b172c69771d470 |
| MD5 hash: | 14817abceacc2869286157bc5198ba30 |
| humanhash: | iowa-pasta-vegan-delta |
| File name: | 14817abceacc2869286157bc5198ba30.exe |
| Download: | download sample |
| File size: | 4'508'672 bytes |
| First seen: | 2023-10-13 11:04:01 UTC |
| Last seen: | 2023-10-13 11:58:28 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 9aebf3da4677af9275c461261e5abde3 (25 x YTStealer, 12 x CobaltStrike, 11 x Hive) |
| ssdeep | 98304:fVHtTKu7hiVzlYtbdmkrfKiu6vFAtgslXW9/Mp2dH+0EXy:fJxEVzQgkrfVuTtgD/Mp2A09 |
| TLSH | T1AE2633DFB43C405FFAB88565514E2D38BE4123EC585B6D3928B0145B82384A9BD74FAB |
| TrID | 63.5% (.EXE) UPX compressed Win64 Executable (70117/5/12) 24.5% (.EXE) UPX compressed Win32 Executable (27066/9/6) 4.5% (.EXE) Win16 NE executable (generic) (5038/12/1) 1.8% (.ICL) Windows Icons Library (generic) (2059/9) 1.8% (.EXE) OS/2 Executable (generic) (2029/13) |
| Reporter | |
| Tags: | exe |
Intelligence
File Origin
# of uploads :
2
# of downloads :
301
Origin country :
NLVendor Threat Intelligence
Malware family:
oski
ID:
1
File name:
3ffe89de639f1b858a8cd42ce3add397.exe
Verdict:
Malicious activity
Analysis date:
2023-07-29 17:55:05 UTC
Tags:
stealc stealer loader lumma oski
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Reading critical registry keys
Running batch commands
Launching a process
Gathering data
Verdict:
Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
anti-debug packed packed packed redcap upx
Verdict:
Malicious
Labled as:
Trojan.Generic
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
DarkBit
Verdict:
Malicious
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw
Score:
64 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
Win64.Trojan.Goback
Status:
Malicious
First seen:
2023-06-17 03:37:00 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
20 of 23 (86.96%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
unknown
Result
Malware family:
n/a
Score:
7/10
Tags:
spyware stealer upx
Behaviour
Suspicious use of WriteProcessMemory
Reads user/profile data of web browsers
UPX packed file
Unpacked files
SH256 hash:
9bdbda93fb550622a226a694e56a1785abb98427e1d9a78e81ff104cc447e1ca
MD5 hash:
dae99d3db82d17f0098283a271c1c31f
SHA1 hash:
7cca7754b3157350c660095befca69a7b9f34aa8
SH256 hash:
a0755055fec6800ed05b9f1c5c1a997a279a6b992a0eca4b0dc3789120ac4ad3
MD5 hash:
14817abceacc2869286157bc5198ba30
SHA1 hash:
8d280a5abede4d4cfb2017ace6b172c69771d470
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
exe a0755055fec6800ed05b9f1c5c1a997a279a6b992a0eca4b0dc3789120ac4ad3
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.