MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a2976291bd9d3b613e6a026e9edb9f6ea1385d64429289443a6df08764b29464. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: a2976291bd9d3b613e6a026e9edb9f6ea1385d64429289443a6df08764b29464
SHA3-384 hash: 43b860361cddd68fb7a110fc4634c94ee9c0da543afceae525897fbed051c0e2b99609822051b5c13a404bc735c07386
SHA1 hash: 1b190e2311d7026d8ccfd3fa1369eeef68683419
MD5 hash: b9afae0351af3a2c96bd7c64126a2ba9
humanhash: romeo-mirror-rugby-apart
File name:malware_with_signature_Accelerate Technologies Ltd
Download: download sample
File size:213'928 bytes
First seen:2020-08-29 08:14:41 UTC
Last seen:2020-08-29 08:37:09 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1be16a98fa77addca61ef7f8d4610634
ssdeep 6144:kiOj1gBk6/HHHHgv9HE4a3HHHH8UFUWGrVENcAk4Wr96d2g/3YyZ2Gqb35tzbCKB:k5jiBkemhRo2g/FZ2j5x
Threatray 4 similar samples on MalwareBazaar
TLSH 3224D005FE4B54F1FFEE1A3888D5F3BB8561E931843FF8A6EB49651CB832141660921E
Reporter JAMESWT_WT
Tags:Accelerate Technologies Ltd

Code Signing Certificate

Organisation:Accelerate Technologies Ltd
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:Mar 7 00:00:00 2020 GMT
Valid to:Mar 4 23:59:59 2021 GMT
Serial number: B3F906E5E6B2CF61C5E51BE79B4E8777
Intelligence: 35 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 2B48363D587B11F2726D343E0ED1D76A2E4ADBC4A383C30CDAE41ADE0006B224
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
3
# of downloads :
77
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.Taskun
Status:
Suspicious
First seen:
2020-08-28 02:46:14 UTC
File Type:
PE (Exe)
AV detection:
28 of 47 (59.57%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  4/10
Tags:
n/a
Behaviour
Modifies data under HKEY_USERS
Suspicious use of AdjustPrivilegeToken
Drops file in Windows directory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments