MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a64a6a0ae6521ef4dc140dcb3ea44f18c7cebe6ee6fee03c7b3ce1d125065aad. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Adware.Generic


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: a64a6a0ae6521ef4dc140dcb3ea44f18c7cebe6ee6fee03c7b3ce1d125065aad
SHA3-384 hash: d9ff2caea9654471852bc06340be1ab0135989679ab01bc840f616a72c06065dcfae2672e80db40fcf901f08575aef24
SHA1 hash: 7db0e6af04c83227a3553fd422a4c55833f6743c
MD5 hash: b12a47d8c210538c98d0bae4c80e3673
humanhash: spring-seventeen-butter-oklahoma
File name:AWB-746262783-3.exe
Download: download sample
Signature Adware.Generic
File size:325'117 bytes
First seen:2020-06-30 14:19:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7c2c71dfce9a27650634dc8b1ca03bf0 (160 x Loki, 58 x Formbook, 55 x Adware.Generic)
ssdeep 6144:3PCganNCn3A/rtHUgfUCN1hEGcKhyf6rcIIUbPLB3ZOd/sQLx:NanU3Ax0gsC7h3hySrcIRilLx
Threatray 643 similar samples on MalwareBazaar
TLSH 7F6412911768ECE7D96017F28C35D8243B5ADD8950A06B0F87B87B2535733C32A6F26E
Reporter James_inthe_box
Tags:Adware.Generic exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
102
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Swotter
Status:
Malicious
First seen:
2020-06-30 13:56:12 UTC
File Type:
PE (Exe)
Extracted files:
10
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
spyware
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Reads user/profile data of web browsers
Reads user/profile data of local email clients
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments