MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a803b45c52fc4db19e364eddfad59a4b131e7552053217d547916bcbfdf8589b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Zegost


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: a803b45c52fc4db19e364eddfad59a4b131e7552053217d547916bcbfdf8589b
SHA3-384 hash: 4319a12b6d700d9bcf92d652c8beef03d77dd3e554c5b03d8a26289287510ca9526e458aec52593cd76183ea5ae60c98
SHA1 hash: ea689a474e33438d7ee3f312aa9506837b069958
MD5 hash: 51a049b0392d813227d3093db8d71c0b
humanhash: bakerloo-sierra-three-pizza
File name:LauncherV2.exe
Download: download sample
Signature Zegost
File size:3'016'127 bytes
First seen:2022-12-16 13:35:00 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d13d399db15c51a1337d692663151209 (3 x Gh0stRAT, 1 x Zegost)
ssdeep 49152:mizYt16TjDqWDgwfi+gC6DXuAdAzAIkBHLOjcyMiKL5L9GLcvtl12KSJmB7x:Cu+WDgwfi+gDXuAitIOIBF7vtl1ZSJs
Threatray 204 similar samples on MalwareBazaar
TLSH T1B3D50127E3714BBEC056C13D81A28E09A76FB87D1737C0C745828659EB59AC02F3666F
TrID 59.1% (.SCR) Windows screen saver (13097/50/3)
13.5% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
9.1% (.EXE) OS/2 Executable (generic) (2029/13)
9.0% (.EXE) Generic Win/DOS Executable (2002/3)
9.0% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon 7b4fcc44361e14a4 (3 x Gh0stRAT, 1 x Zegost)
Reporter iamdeadlyz
Tags:23-106-215-217 exe FakeGaliXCity Gh0stRAT SpaceCity


Avatar
Iamdeadlyz
From spacecity.games (impersonation of galixcity.io)
Gh0stRAT C&C: 23.106.215.217:1017

Intelligence


File Origin
# of uploads :
1
# of downloads :
189
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
LauncherV2.exe
Verdict:
Malicious activity
Analysis date:
2022-12-16 13:35:21 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a file
Running batch commands
Creating a process with a hidden window
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
MalwareBazaar
LanguageCheck
CheckNumberOfProcessor
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
cmd.exe overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
60 / 100
Signature
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Obfuscated Powershell
Behaviour
Behavior Graph:
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
a803b45c52fc4db19e364eddfad59a4b131e7552053217d547916bcbfdf8589b
MD5 hash:
51a049b0392d813227d3093db8d71c0b
SHA1 hash:
ea689a474e33438d7ee3f312aa9506837b069958
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Zegost

Executable exe a803b45c52fc4db19e364eddfad59a4b131e7552053217d547916bcbfdf8589b

(this sample)

Comments