MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a630470ce161a2221c4913198b32f4af64b2d49fa5c64c4c3458475879b2d07e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments 1

SHA256 hash: a630470ce161a2221c4913198b32f4af64b2d49fa5c64c4c3458475879b2d07e
SHA3-384 hash: 8f1a3ff02fc29d57c33e16266247be228aaacc700367ff5fc7efcae10af4752d9dab525ceb94c5a0b8e4a37db910fc8c
SHA1 hash: e4936eab8ecf3db681cbfac2c88073490f0582c6
MD5 hash: f48f1e7412b4ffee39b9713cbf6fb988
humanhash: texas-rugby-zebra-black
File name:Sorillus-Launcher 4.1.exe
Download: download sample
File size:1'672'476 bytes
First seen:2022-02-19 04:51:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c6e51dda1622035b42b177c9afe67c30
ssdeep 49152:IsJqCOAWF6bPkP4zfOMl3uCZY41ZF8aC4:IsJ+6bPkP4qCz1b8t4
Threatray 14 similar samples on MalwareBazaar
TLSH T11075F153E25F8465F967763660AA1E96FC33DF24C452A8AB34FC72824FE2C410E9271D
File icon (PE):PE icon
dhash icon 33e896aaaa96e833
Reporter AndreGironda
Tags:exe sorillus

Intelligence


File Origin
# of uploads :
1
# of downloads :
380
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Sorillus-Launcher 4.1-win.zip
Verdict:
Malicious activity
Analysis date:
2022-02-13 18:50:26 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Launching a process
DNS request
Sending a custom TCP request
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a file
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug anti-vm javadropper overlay packed shell32.dll
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Stealer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
clean
Classification:
n/a
Score:
5 / 100
Behaviour
Behavior Graph:
n/a
Result
Malware family:
n/a
Score:
  4/10
Tags:
n/a
Behaviour
Checks processor information in registry
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Unpacked files
SH256 hash:
a630470ce161a2221c4913198b32f4af64b2d49fa5c64c4c3458475879b2d07e
MD5 hash:
f48f1e7412b4ffee39b9713cbf6fb988
SHA1 hash:
e4936eab8ecf3db681cbfac2c88073490f0582c6
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Multiple

Comments



Avatar
Adm1n 32 USA commented on 2022-02-19 06:56:28 UTC

distributed from https://sorillus.com/