MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a4f03794a30f4230127477884b10f78f28b19134bad42acc337f4cb1dfc86b28. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA 2 File information Comments

SHA256 hash: a4f03794a30f4230127477884b10f78f28b19134bad42acc337f4cb1dfc86b28
SHA3-384 hash: a64b436e77baf7805098d1716b1a874af4658b4d1c006e581143db7ce385cb2b73ed343665fa33eb8fa2c49ce5fe14a3
SHA1 hash: 57bb02600c6081652ea82a9daf3e50849d593468
MD5 hash: a4ff524916fa5f7082cf0371a8af61ba
humanhash: cold-robert-purple-uncle
File name:Cheat Injector.exe
Download: download sample
File size:334'848 bytes
First seen:2023-01-29 20:29:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 0b5552dccd9d0a834cea55c0c8fc05be (16 x LunaLogger, 16 x BlankGrabber, 8 x CrealStealer)
ssdeep 6144:gBfaB/yttqQ0XWhGF9HIkHyUVdA31WrTm5V0V3JXtiF:sfwKttq5XWhGF9HIkH33e5WVZdiF
Threatray 278 similar samples on MalwareBazaar
TLSH T1F3648C5C73A108F8FDB3613EC882C506D6B5B8260754D68B03B4966A5F337A16E3FB91
TrID 48.7% (.EXE) Win64 Executable (generic) (10523/12/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon 78ccea5571aaf071
Reporter Anonymous
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
183
Origin country :
RU RU
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
clean
Classification:
n/a
Score:
6 / 100
Behaviour
Behavior Graph:
n/a
Result
Malware family:
n/a
Score:
  3/10
Tags:
pyinstaller
Unpacked files
SH256 hash:
a4f03794a30f4230127477884b10f78f28b19134bad42acc337f4cb1dfc86b28
MD5 hash:
a4ff524916fa5f7082cf0371a8af61ba
SHA1 hash:
57bb02600c6081652ea82a9daf3e50849d593468
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:PyInstaller
Author:@bartblaze
Description:Identifies executable converted using PyInstaller.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments