MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a4174c173e962859c22869582958609291ccd778490375f71e883f63f34b5bf2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 2


Intelligence 2 IOCs YARA File information Comments

SHA256 hash: a4174c173e962859c22869582958609291ccd778490375f71e883f63f34b5bf2
SHA3-384 hash: 4aec560a69ece6bdca4009b9e4c0bbd7cd57c43b24aeb37889f81c4adbaf7483e66bd2aaf34b8282744eb32711b6af60
SHA1 hash: 65a84ccfb14677403fece498aa7381ed17c0c22a
MD5 hash: 5f15a4f2691adbbe3c94f9f31133bd0c
humanhash: delaware-hamper-edward-tennessee
File name:a4174c173e962859c22869582958609291ccd778490375f71e883f63f34b5bf2
Download: download sample
File size:261'120 bytes
First seen:2020-06-03 09:22:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a64e048b98d051ae6e6b6334f77c95d3 (7 x Berbew)
ssdeep 3072:pBe/tUlvsld9G6QNx5Rf1FsXaFDKdhk3pIXW8TprCAm1mTDKaFDKdhk3pIX:pyCtsT9ENLFsXaeXW8laeKaeX
TLSH 6944485EE5AA7997FEB3063BE3894723BD4BEC640F4981082707A53497CD1CE9CA7241
Reporter raashidbhatt
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
61
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Berbew
Status:
Malicious
First seen:
2020-06-03 11:08:15 UTC
AV detection:
31 of 31 (100.00%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
n/a
Score:
  10/10
Tags:
persistence
Behaviour
Modifies registry class
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Drops file in System32 directory
Loads dropped DLL
Executes dropped EXE
ServiceHost packer
Adds autorun key to be loaded by Explorer.exe on startup
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments