MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a288c4d3129a5fbc475d58916a465a9e43ba804a23dd6aa6726947c4ce9081bf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkVNC


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments 1

SHA256 hash: a288c4d3129a5fbc475d58916a465a9e43ba804a23dd6aa6726947c4ce9081bf
SHA3-384 hash: ca97257906b7cdc5f12bd9c46e5ed6246b4a7b2c431fb8bd41fab1cd6f419a669f026ba3cac3daf4ef46a52b1e64062b
SHA1 hash: a95ab1a564e5d3f5c5aa597e28a05a21e23c3256
MD5 hash: a3fd74bc897d19c94815d58ba48c199f
humanhash: green-eight-alabama-wisconsin
File name:a3fd74bc897d19c94815d58ba48c199f
Download: download sample
Signature DarkVNC
File size:1'180'672 bytes
First seen:2021-07-08 16:03:46 UTC
Last seen:2021-07-08 17:37:34 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e17f7b1d002ab984875bfae146483af9 (1 x DarkVNC)
ssdeep 24576:NtpkMXRIq9LVva8yqY7yUlSK9vfTK5PVnXzJSXquTWaCphXEkMMr0:NtXImLp0qY7yUlSKdKZVnidtItMZ
Threatray 2'463 similar samples on MalwareBazaar
TLSH T1C5450110BB61D03AF5B726F4457592A8663E3EB1AF2090CBE2D526EE56702D0ECF1317
Reporter zbetcheckin
Tags:32 DarkVNC exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
160
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a3fd74bc897d19c94815d58ba48c199f
Verdict:
Malicious activity
Analysis date:
2021-07-08 16:06:14 UTC
Tags:
trojan danabot

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
DarkVNC
Detection:
malicious
Classification:
bank.troj.adwa.spyw.evad
Score:
96 / 100
Signature
Bypasses PowerShell execution policy
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Enables a proxy for the internet explorer
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sets a proxy for the internet explorer
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected DarkVNC
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 446032 Sample: 3XmOPwy0nJ Startdate: 08/07/2021 Architecture: WINDOWS Score: 96 37 Yara detected DarkVNC 2->37 39 Machine Learning detection for sample 2->39 9 3XmOPwy0nJ.exe 1 2->9         started        process3 signatures4 49 Detected unpacking (changes PE section rights) 9->49 51 Detected unpacking (overwrites its own PE header) 9->51 12 rundll32.exe 6 9->12         started        process5 dnsIp6 35 192.236.194.109, 443, 49709, 49715 HOSTWINDSUS United States 12->35 31 C:\ProgramData\Bklngfpngf\kgjocbpkfku.tmp, PE32 12->31 dropped 33 C:\Users\user\Desktop\3XmOPwy0nJ.exe, data 12->33 dropped 53 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 12->53 55 Bypasses PowerShell execution policy 12->55 17 rundll32.exe 10 24 12->17         started        file7 signatures8 process9 file10 29 C:\Users\user\AppData\...\tmp4AA7.tmp.ps1, ASCII 17->29 dropped 41 System process connects to network (likely due to code injection or exploit) 17->41 43 Tries to harvest and steal browser information (history, passwords, etc) 17->43 45 Sets a proxy for the internet explorer 17->45 47 Enables a proxy for the internet explorer 17->47 21 powershell.exe 17 17->21         started        23 powershell.exe 8 17->23         started        signatures11 process12 process13 25 conhost.exe 21->25         started        27 conhost.exe 23->27         started       
Threat name:
Win32.Trojan.Graftor
Status:
Malicious
First seen:
2021-07-08 16:04:10 UTC
File Type:
PE (Exe)
Extracted files:
24
AV detection:
16 of 29 (55.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery spyware stealer
Behaviour
Checks processor information in registry
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Suspicious use of SetThreadContext
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Unpacked files
SH256 hash:
fb4895acc0553f810caf3a6d26a4eb7af18934571ff21b05a2ac07232a226bc9
MD5 hash:
fe7ba6f8c484342ddd60c5e99fd5cea9
SHA1 hash:
c809081cfc879d6428dffc9c536c32f86318a319
SH256 hash:
fb4895acc0553f810caf3a6d26a4eb7af18934571ff21b05a2ac07232a226bc9
MD5 hash:
fe7ba6f8c484342ddd60c5e99fd5cea9
SHA1 hash:
c809081cfc879d6428dffc9c536c32f86318a319
SH256 hash:
300baa2fbcec19a4629be145cccf71d7f850144191b3730acd3c7c4f2f21c2df
MD5 hash:
3ea37a1dde22c6ee56b063dca5be2bc9
SHA1 hash:
d65d36cd6e56f597b037373e99f9d00073c37d50
SH256 hash:
22aab7ca8a3548d7b4e57dba79c24805da52be625bb0c6fac1a3963dabc4e45f
MD5 hash:
1d55ee07d13fddf22ec47023262d4bd9
SHA1 hash:
7795f960bcf1b3b38491a565684b7e54cf0bdb55
SH256 hash:
ef5c76ff6ec9910534e19c582aaddb2de5fb7d3d9e136b1b6d5572b271efaa0a
MD5 hash:
84b0d302b68cf9336e3aa1031ba7855c
SHA1 hash:
1c0bfa983a8b32a783b8e88d0609d31f8eef6b3e
SH256 hash:
eacc59d83ee32cf8dc5b87a997b437dc7094df74eaf2209e8c98c44fd71d19b4
MD5 hash:
85b2c82485143527f90619509e165fbf
SHA1 hash:
adaca291acac543a2ca2ed1b260b6d316d890791
SH256 hash:
a288c4d3129a5fbc475d58916a465a9e43ba804a23dd6aa6726947c4ce9081bf
MD5 hash:
a3fd74bc897d19c94815d58ba48c199f
SHA1 hash:
a95ab1a564e5d3f5c5aa597e28a05a21e23c3256
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DarkVNC

Executable exe a288c4d3129a5fbc475d58916a465a9e43ba804a23dd6aa6726947c4ce9081bf

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-07-08 16:03:48 UTC

url : hxxp://142.44.224.31/schhosts.exe