MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a1e4ebaa0bf6e0177c4d36722ed2e5e8353b2dfd0247b68a0865145cede77dbd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NightHawk


Vendor detections: 9


Intelligence 9 IOCs YARA 4 File information Comments

SHA256 hash: a1e4ebaa0bf6e0177c4d36722ed2e5e8353b2dfd0247b68a0865145cede77dbd
SHA3-384 hash: 8cafadf5922aa232486f51ba671724229343bf392d1c450bb8840d4aa7f0a15becafeef6da2698b6e0f5e30219bb2a69
SHA1 hash: c82809c5876d01d6a94e50666765730cc913736d
MD5 hash: 9a22cf2f04274dcbc01c493610346dab
humanhash: autumn-mars-oregon-violet
File name:igmfnswgkb.exe
Download: download sample
Signature NightHawk
File size:673'424 bytes
First seen:2022-12-02 17:14:58 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b65649d17ba8ce657a9157e5347cbdba (320 x NightHawk)
ssdeep 12288:BzKes6nd1j6ZtVTsaP97cwN7RErQKmYemoTEz7HQwKOhD/yQP4sW0:JTdn/WBsaVpN7RErvmN0DhbJgsp
TLSH T1B6E42363F7A73AD8E9714D36099A055A5BFEFD7414A0AF3A0648725A1E3D2060F34CA3
TrID 48.7% (.EXE) Win64 Executable (generic) (10523/12/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Reporter tokerzeynep
Tags:Beacon exe Nighthawk

Intelligence


File Origin
# of uploads :
1
# of downloads :
194
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
igmfnswgkb.exe
Verdict:
No threats detected
Analysis date:
2022-12-02 17:15:40 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a window
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed rat
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-12-02 17:15:08 UTC
File Type:
PE+ (Exe)
AV detection:
16 of 41 (39.02%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Modifies system certificate store
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
a1e4ebaa0bf6e0177c4d36722ed2e5e8353b2dfd0247b68a0865145cede77dbd
MD5 hash:
9a22cf2f04274dcbc01c493610346dab
SHA1 hash:
c82809c5876d01d6a94e50666765730cc913736d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:Nighthawk_RAT
Author:Frank Boldewin (@r3c0nst)
Description:Detects Nighthawk RAT
Rule name:SUSP_XORed_URL_in_EXE_RID2E46
Author:Florian Roth
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834
Rule name:yara_template

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Multiple

Comments