MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a608a7e09fcb8145539f7636874f534cdb7ddb3ff54ecbd05accbab0b414047a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Zegost


Vendor detections: 9


Intelligence 9 IOCs YARA 3 File information Comments

SHA256 hash: a608a7e09fcb8145539f7636874f534cdb7ddb3ff54ecbd05accbab0b414047a
SHA3-384 hash: c5c688ef94c2843ae588253cf1d892c6c4767d2f61305d62291653f0c40627805bfef5db4ee63e84028b33b1696698c3
SHA1 hash: b8fd959c7177cedcfc8a03f3313ed968371519ce
MD5 hash: db4e76ae4aebbbd14624a64f3b72104d
humanhash: lima-hawaii-twelve-fanta
File name:db4e76ae4aebbbd14624a64f3b72104d.exe
Download: download sample
Signature Zegost
File size:337'172 bytes
First seen:2021-03-22 20:00:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e7e355ac0da5b0dd6c80ff7cfdae5e4d (1 x Zegost, 1 x Blackmoon)
ssdeep 6144:ptOiOvWy4Gx4GlIwfg5sGpTtaREWVoDO9qwo5lCiqhbeloJZyXwcaEOmwQDF:ptOiStKu3fgV7+oDO9HinAeZXwW3w+
Threatray 1 similar samples on MalwareBazaar
TLSH C06422F1EFDED069C2B29178616AB740234BE32485A653827F47E9DF8CB0151DB87683
Reporter abuse_ch
Tags:exe Zegost

Intelligence


File Origin
# of uploads :
1
# of downloads :
128
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
db4e76ae4aebbbd14624a64f3b72104d.exe
Verdict:
No threats detected
Analysis date:
2021-03-22 20:04:37 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the Windows subdirectories
Creating a service
Launching a service
Launching a process
DNS request
Connection attempt
Running batch commands
Creating a process with a hidden window
Sending a UDP request
Enabling autorun for a service
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to detect sleep reduction / modifications
Creates a Windows Service pointing to an executable in C:\Windows
Deletes itself after installation
DLL side loading technique detected
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 373485 Sample: pYWw8rJe5q.exe Startdate: 23/03/2021 Architecture: WINDOWS Score: 100 38 Malicious sample detected (through community Yara rule) 2->38 40 Antivirus detection for dropped file 2->40 42 Antivirus / Scanner detection for submitted sample 2->42 44 2 other signatures 2->44 7 svchost.exe 2->7         started        10 pYWw8rJe5q.exe 2 2 2->10         started        13 svchost.exe 2->13         started        15 11 other processes 2->15 process3 dnsIp4 48 DLL side loading technique detected 7->48 50 Contains functionality to compare user and computer (likely to detect sandboxes) 7->50 52 Contains functionality to detect sleep reduction / modifications 7->52 18 rundll32.exe 7->18         started        30 C:\Windows\SysWOW64\48b519.dll, PE32 10->30 dropped 54 Creates a Windows Service pointing to an executable in C:\Windows 10->54 56 Deletes itself after installation 10->56 22 cmd.exe 1 10->22         started        58 Changes security center settings (notifications, updates, antivirus, firewall) 13->58 24 MpCmdRun.exe 1 13->24         started        36 127.0.0.1 unknown unknown 15->36 file5 signatures6 process7 dnsIp8 32 woshima.xyz 43.229.153.157, 49709, 49712, 49716 TELECOM-HKHongKongTelecomGlobalDataCentreHK Hong Kong 18->32 34 site.woshima.xyz 18->34 46 System process connects to network (likely due to code injection or exploit) 18->46 26 conhost.exe 22->26         started        28 conhost.exe 24->28         started        signatures9 process10
Threat name:
Win32.Trojan.Redosdru
Status:
Malicious
First seen:
2021-03-22 15:23:22 UTC
AV detection:
28 of 28 (100.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence upx
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in System32 directory
Deletes itself
Loads dropped DLL
Blocklisted process makes network request
Sets DLL path for service in the registry
Unpacked files
SH256 hash:
86390c9407c61353595e43aa87475ffe96d9892cfac3324d02b374d11747184d
MD5 hash:
1b41c32c859068ccd215b12344604329
SHA1 hash:
78d993762beba924546628c39af7d8b2e28b1fff
SH256 hash:
01879c9fac4fe3225205af114719ecc7f67c52631f705b6384875433e2b01e0f
MD5 hash:
92e7366bbb9e5a2c5fdf05b29e51437a
SHA1 hash:
637c48a25e5b9182d443810a51c4427c81fd269d
SH256 hash:
a608a7e09fcb8145539f7636874f534cdb7ddb3ff54ecbd05accbab0b414047a
MD5 hash:
db4e76ae4aebbbd14624a64f3b72104d
SHA1 hash:
b8fd959c7177cedcfc8a03f3313ed968371519ce
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:OpCloudHopper_Malware_2
Author:Florian Roth
Description:Detects malware from Operation Cloud Hopper
Reference:https://www.pwc.co.uk/issues/cyber-security-data-privacy/insights/operation-cloud-hopper.html
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Zegost

Executable exe a608a7e09fcb8145539f7636874f534cdb7ddb3ff54ecbd05accbab0b414047a

(this sample)

  
Delivery method
Distributed via web download

Comments