MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a162a4a82e21300ea8634e03e4d7f4b186cff8b9c41e2e9c46ca0c72e97aeacb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: a162a4a82e21300ea8634e03e4d7f4b186cff8b9c41e2e9c46ca0c72e97aeacb
SHA3-384 hash: 7125c4dbab35c0af5d1ec0e6c03a6cfe80ee8c21952d7d932f22478f8851933d8307f5c846be69b4726ac740bdf77557
SHA1 hash: 1e6e4c258957d0d070749402e70568bbe04aed8d
MD5 hash: b09d4ba32c1eded79818fb9b643790fa
humanhash: zebra-virginia-hydrogen-equal
File name:file
Download: download sample
File size:4'471'296 bytes
First seen:2022-11-13 08:16:08 UTC
Last seen:2022-11-14 07:06:51 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9aebf3da4677af9275c461261e5abde3 (25 x YTStealer, 12 x CobaltStrike, 11 x Hive)
ssdeep 98304:XUoPQlwUOqr9Tc6XFaE/qr5DMrhZUEzj6oOgSAxFa39zL:E0Qy+c6X8E8MNyoaAxFaN
Threatray 147 similar samples on MalwareBazaar
TLSH T10526336A6299F418DA73B5F03A7FC5E31B65029FE6C947428217F9692F00E070A37DC6
TrID 64.7% (.EXE) UPX compressed Win64 Executable (70117/5/12)
25.0% (.EXE) UPX compressed Win32 Executable (27066/9/6)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.8% (.EXE) OS/2 Executable (generic) (2029/13)
1.8% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter andretavare5
Tags:exe


Avatar
andretavare5
Sample downloaded from https://vk.com/doc760750097_655963670?hash=TSvSuqajFjLGuKBR72RUucMYScokNMfZC1pmoXxtHIP&dl=G43DANZVGAYDSNY:1668327174:85JAL4iTGjlQiRycfJ9gYLtT7URhMZzbJDAUAURtBLX&api=1&no_preview=1#dozkey5

Intelligence


File Origin
# of uploads :
579
# of downloads :
173
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
No threats detected
Analysis date:
2022-11-13 08:19:26 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Running batch commands
Launching a process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw
Score:
52 / 100
Signature
Antivirus / Scanner detection for submitted sample
Tries to harvest and steal browser information (history, passwords, etc)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 744843 Sample: file.exe Startdate: 13/11/2022 Architecture: WINDOWS Score: 52 21 Antivirus / Scanner detection for submitted sample 2->21 7 file.exe 2->7         started        process3 dnsIp4 17 youtube-ui.l.google.com 172.217.168.14, 443, 49698 GOOGLEUS United States 7->17 19 www.youtube.com 7->19 23 Tries to harvest and steal browser information (history, passwords, etc) 7->23 11 cmd.exe 1 7->11         started        signatures5 process6 process7 13 conhost.exe 11->13         started        15 choice.exe 1 11->15         started       
Threat name:
Win64.Trojan.Privateloader
Status:
Malicious
First seen:
2022-11-13 08:17:23 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
16 of 26 (61.54%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware stealer upx
Behaviour
Suspicious use of WriteProcessMemory
Reads user/profile data of web browsers
UPX packed file
Gathering data
Unpacked files
SH256 hash:
c09185fd2c53ba71595c3aa7395bb6e43dcde7dec890bb10217bc68686a6ab87
MD5 hash:
c5d8a6326798b2c8a9d2dc16b6773562
SHA1 hash:
9a59bcc10ad97aa54f1f104de5173f881c7fa547
SH256 hash:
a162a4a82e21300ea8634e03e4d7f4b186cff8b9c41e2e9c46ca0c72e97aeacb
MD5 hash:
b09d4ba32c1eded79818fb9b643790fa
SHA1 hash:
1e6e4c258957d0d070749402e70568bbe04aed8d
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments