MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a902469714ec172e7d2fde514e058670f21d8a5dba89241fd4f3ccc23baf4288. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 13


Intelligence 13 IOCs YARA 3 File information Comments 1

SHA256 hash: a902469714ec172e7d2fde514e058670f21d8a5dba89241fd4f3ccc23baf4288
SHA3-384 hash: d61d236fdf40fff11f112f5353f30a8f3fdfc8b14756d1aade0011ea08a2f6ce648971ee3b2247bfbc1b1c857dca6312
SHA1 hash: f9f7cb5ce46461a2ee9b7353ff768a04738a55a2
MD5 hash: 1c0cd7c46199da37d5f4910a6322da90
humanhash: robin-hydrogen-december-lemon
File name:1c0cd7c46199da37d5f4910a6322da90
Download: download sample
File size:1'547'296 bytes
First seen:2023-02-20 11:34:58 UTC
Last seen:2023-02-20 13:32:29 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4a43ef13050d45ae61812b2997033821 (2 x GCleaner, 1 x SystemBC, 1 x Rhadamanthys)
ssdeep 24576:dFdHMCfUktBOKQm2h1L27l20PjhqmhCvgu167qqyG2aQQ6C/jvOGMQHc2cPNtQlL:9sktcS0KKBGAQZ7mG3lROqKD27Lz
Threatray 195 similar samples on MalwareBazaar
TLSH T11F65D0CB00161DF2C101CAFDF7E6B0A09CDB6A60ED1189F51286E4AFDDD6ADCA87544E
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4505/5/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon f5d8f4ccccf0f050
Reporter zbetcheckin
Tags:32 exe signed

Code Signing Certificate

Organisation:arrow.com
Issuer:DigiCert TLS RSA SHA256 2020 CA1
Algorithm:sha256WithRSAEncryption
Valid from:2022-08-30T00:00:00Z
Valid to:2023-08-30T23:59:59Z
Serial number: 0439fccde6e543f464d789cff8fe024b
Intelligence: 6 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 4a7804fb988c5dc61d03afda2634e67c50a43dd0885bed069ce4165febed9bdd
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
207
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
1c0cd7c46199da37d5f4910a6322da90
Verdict:
Malicious activity
Analysis date:
2023-02-20 11:39:49 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Сreating synchronization primitives
Creating a file
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
CheckScreenResolution
CheckCmdLine
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware overlay packed shell32.dll
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Mustang Panda
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
Encrypted powershell cmdline option found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Yara detected Costura Assembly Loader
Yara Genericmalware
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2023-02-20 11:35:09 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
17 of 25 (68.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Unpacked files
SH256 hash:
1d8ca51dc227ef7b158214b222afa356118519674ddface5a6490a3c0a8097f6
MD5 hash:
ffb0d543bcb99d613e834c3ac8b8a787
SHA1 hash:
632311219d29acfd74a62f3c6da78377079e0c22
SH256 hash:
a902469714ec172e7d2fde514e058670f21d8a5dba89241fd4f3ccc23baf4288
MD5 hash:
1c0cd7c46199da37d5f4910a6322da90
SHA1 hash:
f9f7cb5ce46461a2ee9b7353ff768a04738a55a2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe a902469714ec172e7d2fde514e058670f21d8a5dba89241fd4f3ccc23baf4288

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-02-20 11:35:01 UTC

url : hxxp://77.91.84.92/3YXeKmIFGXNC.exe