MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a630470ce161a2221c4913198b32f4af64b2d49fa5c64c4c3458475879b2d07e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 6
| SHA256 hash: | a630470ce161a2221c4913198b32f4af64b2d49fa5c64c4c3458475879b2d07e |
|---|---|
| SHA3-384 hash: | 8f1a3ff02fc29d57c33e16266247be228aaacc700367ff5fc7efcae10af4752d9dab525ceb94c5a0b8e4a37db910fc8c |
| SHA1 hash: | e4936eab8ecf3db681cbfac2c88073490f0582c6 |
| MD5 hash: | f48f1e7412b4ffee39b9713cbf6fb988 |
| humanhash: | texas-rugby-zebra-black |
| File name: | Sorillus-Launcher 4.1.exe |
| Download: | download sample |
| File size: | 1'672'476 bytes |
| First seen: | 2022-02-19 04:51:01 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c6e51dda1622035b42b177c9afe67c30 |
| ssdeep | 49152:IsJqCOAWF6bPkP4zfOMl3uCZY41ZF8aC4:IsJ+6bPkP4qCz1b8t4 |
| Threatray | 14 similar samples on MalwareBazaar |
| TLSH | T11075F153E25F8465F967763660AA1E96FC33DF24C452A8AB34FC72824FE2C410E9271D |
| File icon (PE): | |
| dhash icon | 33e896aaaa96e833 |
| Reporter | |
| Tags: | exe sorillus |
Intelligence
File Origin
# of uploads :
1
# of downloads :
380
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Sorillus-Launcher 4.1-win.zip
Verdict:
Malicious activity
Analysis date:
2022-02-13 18:50:26 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
Clean
Maliciousness:
Behaviour
Searching for the window
Launching a process
DNS request
Sending a custom TCP request
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a file
Result
Malware family:
n/a
Score:
6/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
CheckCmdLine
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
anti-debug anti-vm javadropper overlay packed shell32.dll
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Stealer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
clean
Classification:
n/a
Score:
5 / 100
Behaviour
Behavior Graph:
n/a
Verdict:
unknown
Similar samples:
+ 4 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
4/10
Tags:
n/a
Behaviour
Checks processor information in registry
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Unpacked files
SH256 hash:
a630470ce161a2221c4913198b32f4af64b2d49fa5c64c4c3458475879b2d07e
MD5 hash:
f48f1e7412b4ffee39b9713cbf6fb988
SHA1 hash:
e4936eab8ecf3db681cbfac2c88073490f0582c6
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.21
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Delivery method
Multiple
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.distributed from https://sorillus.com/