MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a739910a18c1ded77bca7f33c0ff47bf2ef0c049bf0d53d2f7c045d25659581b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: a739910a18c1ded77bca7f33c0ff47bf2ef0c049bf0d53d2f7c045d25659581b
SHA3-384 hash: 0152004736d2c296d6a2fefd9d4bca3257593bad92bb45e6e11e9ed80249d0283a70b6cf53774d620eb1af851b88198b
SHA1 hash: 84ba4b8b9f6e273d6c824ba9cfbf659b8dae120e
MD5 hash: 92cec63e095be5beb1029220cb585144
humanhash: stream-edward-indigo-vermont
File name:bufera.exe
Download: download sample
File size:23'552 bytes
First seen:2020-07-27 06:57:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 18af9c36a1ed09e69b768d287deb92f8
ssdeep 384:eYDVv36/pKEKK+DvHKI4GSFdkKND5qREXalnl6Rel7xI:xBv3eKEKvS75qREGl6S7
Threatray 19 similar samples on MalwareBazaar
TLSH 6BB22A4AE207D8F1E75282FD8DEEC77F4BE6A612CC2B6F76FB64B66C59231112414600
Reporter JAMESWT_WT

Intelligence


File Origin
# of uploads :
1
# of downloads :
76
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Enabling autorun with Startup directory
Result
Threat name:
Unknown
Detection:
malicious
Classification:
adwa
Score:
60 / 100
Signature
Drops PE files to the startup folder
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 251358 Sample: bufera.exe Startdate: 27/07/2020 Architecture: WINDOWS Score: 60 15 Multi AV Scanner detection for dropped file 2->15 17 Multi AV Scanner detection for submitted file 2->17 5 bufera.exe 2 2->5         started        9 setup.exe 2->9         started        11 setup.exe 2->11         started        process3 file4 13 C:\Users\user\AppData\Roaming\...\setup.exe, PE32 5->13 dropped 19 Drops PE files to the startup folder 5->19 signatures5
Threat name:
Win32.Trojan.ClipBanker
Status:
Malicious
First seen:
2020-07-25 21:33:04 UTC
File Type:
PE (Exe)
AV detection:
18 of 27 (66.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Drops startup file
Drops startup file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe a739910a18c1ded77bca7f33c0ff47bf2ef0c049bf0d53d2f7c045d25659581b

(this sample)

  
Delivery method
Distributed via web download

Comments