MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a8a172e5e99b940b86720dfffa4a822a486b4a7334c420cdefae80fca5ce2638. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments 1

SHA256 hash: a8a172e5e99b940b86720dfffa4a822a486b4a7334c420cdefae80fca5ce2638
SHA3-384 hash: 75a7f1bca68190d7b149f8a070c3d04b537141ec03169824e49ba5be6b6217d0b4ef3f21ecd8444852717caff472bc2a
SHA1 hash: eaf08e786af7ffcfcc38037999f2adf803bef1e4
MD5 hash: 90427a600ba896346dca58a43f4cc77f
humanhash: kitten-california-april-fix
File name:90427a600ba896346dca58a43f4cc77f
Download: download sample
File size:4'877'824 bytes
First seen:2023-11-08 01:10:39 UTC
Last seen:2023-11-08 02:23:46 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6e9b3e1bda3c0f68dc16d377339cf3e1
ssdeep 98304:KEjAuvLZidHg42wcN3zhgDsZvIkZXiCIc42sLFhaRhZ:KzYWHg4FcN3zBZvbIc42Esh
Threatray 54 similar samples on MalwareBazaar
TLSH T1EC362371E3D04937F17316389C2B92687A39FF022B3869AA6FF45C0C6F396907915267
TrID 38.3% (.SCR) Windows screen saver (13097/50/3)
30.8% (.EXE) Win64 Executable (generic) (10523/12/4)
13.1% (.EXE) Win32 Executable (generic) (4505/5/1)
5.9% (.EXE) OS/2 Executable (generic) (2029/13)
5.8% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer)
Reporter zbetcheckin
Tags:32 exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
352
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a process with a hidden window
Launching a process
Using the Windows Management Instrumentation requests
Running batch commands
Creating a process from a recently created file
DNS request
Searching for the window
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Launching cmd.exe command interpreter
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control keylogger lolbin packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.spyw.evad
Score:
96 / 100
Signature
Antivirus detection for URL or domain
Deletes itself after installation
Drops PE files with a suspicious file extension
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Opens network shares
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses the Telegram API (likely for C&C communication)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1338724 Sample: XS3sNotzzw.exe Startdate: 08/11/2023 Architecture: WINDOWS Score: 96 47 UGimJTaULZqJErlriNlsHPaO.UGimJTaULZqJErlriNlsHPaO 2->47 49 ipwho.is 2->49 51 api.telegram.org 2->51 63 Antivirus detection for URL or domain 2->63 65 Multi AV Scanner detection for submitted file 2->65 67 Uses the Telegram API (likely for C&C communication) 2->67 12 XS3sNotzzw.exe 23 2->12         started        signatures3 process4 file5 45 C:\Users\user\AppData\Local\Temp\...\Plants, PE32+ 12->45 dropped 83 Opens network shares 12->83 16 cmd.exe 1 12->16         started        19 conhost.exe 12->19         started        signatures6 process7 signatures8 57 Uses ping.exe to sleep 16->57 59 Drops PE files with a suspicious file extension 16->59 61 Uses ping.exe to check the status of other devices and networks 16->61 21 cmd.exe 1 16->21         started        process9 signatures10 73 Uses ping.exe to sleep 21->73 24 Publication.pif 21->24         started        27 cmd.exe 2 21->27         started        30 cmd.exe 2 21->30         started        32 6 other processes 21->32 process11 file12 77 Deletes itself after installation 24->77 79 Modifies the context of a thread in another process (thread injection) 24->79 81 Injects a PE file into a foreign processes 24->81 34 Publication.pif 27 24->34         started        43 C:\Users\user\AppData\...\Publication.pif, PE32+ 27->43 dropped signatures13 process14 dnsIp15 53 api.telegram.org 149.154.167.220, 443, 49736 TELEGRAMRU United Kingdom 34->53 55 ipwho.is 147.135.36.89, 49735, 80 OVHFR United States 34->55 69 Found many strings related to Crypto-Wallets (likely being stolen) 34->69 71 Tries to harvest and steal browser information (history, passwords, etc) 34->71 38 powershell.exe 15 34->38         started        signatures16 process17 signatures18 75 Found many strings related to Crypto-Wallets (likely being stolen) 38->75 41 conhost.exe 38->41         started        process19
Result
Malware family:
n/a
Score:
  10/10
Tags:
spyware stealer
Behaviour
Enumerates processes with tasklist
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Deletes itself
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Suspicious use of NtCreateUserProcessOtherParentProcess
Unpacked files
SH256 hash:
a8a172e5e99b940b86720dfffa4a822a486b4a7334c420cdefae80fca5ce2638
MD5 hash:
90427a600ba896346dca58a43f4cc77f
SHA1 hash:
eaf08e786af7ffcfcc38037999f2adf803bef1e4
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe a8a172e5e99b940b86720dfffa4a822a486b4a7334c420cdefae80fca5ce2638

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-11-08 01:10:40 UTC

url : hxxps://cutt.ly/wwRBoqIz/