MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a0dc657791e6bf1267c8ccb48f337569d9b77f46922c5dd4761010fc7b8f94a6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: a0dc657791e6bf1267c8ccb48f337569d9b77f46922c5dd4761010fc7b8f94a6
SHA3-384 hash: 64102f3d90aad369df33a22d3b32488d7ff2d5f5e184a0b865fa26586bd85909719ee2b1c9f6d56ba9684d9f79a16992
SHA1 hash: e56d996dcf51bffca9b9ba5f0b25965528f97532
MD5 hash: 216064bcf3506cdc18c71b96ed534887
humanhash: purple-lemon-hydrogen-four
File name:216064bcf3506cdc18c71b96ed534887.exe
Download: download sample
File size:2'140'979 bytes
First seen:2022-05-24 12:56:05 UTC
Last seen:2022-05-24 13:48:58 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ab9ff6e4872ea2766a5f5c6af5649e9d (20 x CryptOne, 13 x RedLineStealer, 6 x RecordBreaker)
ssdeep 24576:gJr8tE+gHq0qC7ecgKGluUHhr8fI2NhzBsTr6PaeQQbVArrXdGjcj2:gJ4N0ZUHpqRyf61ZmNYf
Threatray 342 similar samples on MalwareBazaar
TLSH T145A52409A147E27BFCEC18E7055181D0C29C7FAA7B528DCDE93AC686101F482F7B6D86
TrID 91.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.6% (.EXE) Win64 Executable (generic) (10523/12/4)
1.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
0.6% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 9494b494d4aeaeac (832 x DCRat, 172 x RedLineStealer, 134 x CryptOne)
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
265
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
23EB.exe
Verdict:
Malicious activity
Analysis date:
2022-05-24 12:00:54 UTC
Tags:
evasion redline trojan socelars stealer loader rat amadey ransomware stop phishing

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% directory
Launching a process
Sending a custom TCP request
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay setupapi.dll shdocvw.dll shell32.dll update.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
68 / 100
Signature
Antivirus detection for dropped file
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 633138 Sample: gMPJdaJyQ5.exe Startdate: 24/05/2022 Architecture: WINDOWS Score: 68 23 Antivirus detection for dropped file 2->23 25 Multi AV Scanner detection for dropped file 2->25 27 Multi AV Scanner detection for submitted file 2->27 9 gMPJdaJyQ5.exe 8 2->9         started        process3 file4 21 C:\Users\user\AppData\Local\Temp\AsCr.u, PE32 9->21 dropped 29 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 9->29 13 control.exe 1 9->13         started        signatures5 process6 process7 15 rundll32.exe 13->15         started        process8 17 rundll32.exe 15->17         started        process9 19 rundll32.exe 17->19         started       
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2022-05-24 01:36:16 UTC
AV detection:
17 of 26 (65.38%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Loads dropped DLL
Unpacked files
SH256 hash:
a0dc657791e6bf1267c8ccb48f337569d9b77f46922c5dd4761010fc7b8f94a6
MD5 hash:
216064bcf3506cdc18c71b96ed534887
SHA1 hash:
e56d996dcf51bffca9b9ba5f0b25965528f97532
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe a0dc657791e6bf1267c8ccb48f337569d9b77f46922c5dd4761010fc7b8f94a6

(this sample)

  
Delivery method
Distributed via web download

Comments