MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aa13522eb7aa3679ccdfd392edf58e980c55dcca4fe0849c746e331b1268ddc7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: aa13522eb7aa3679ccdfd392edf58e980c55dcca4fe0849c746e331b1268ddc7
SHA3-384 hash: 634fd399fdb8d0b2b4e3260393223caa15ffea299e5a98bd1e079711f1f4eb279c882981ea65e7f3d321db9f6162cd7b
SHA1 hash: 67bc2f4beb0a3c112e8de4b90bc5a299281370f1
MD5 hash: 256220744667f50e5a350127068244d5
humanhash: nebraska-helium-wisconsin-gee
File name:SecuriteInfo.com.Trojan.PWS.Stealer.33290.29332.16877
Download: download sample
File size:109'176 bytes
First seen:2022-07-15 09:52:48 UTC
Last seen:2024-07-24 20:07:12 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 43b07568a4f77ccd0ff61207e68c4dbd (3 x RedLineStealer)
ssdeep 3072:UnbgENEISy0x2ccwfKRUWvGcRiVPjCJzGRuq5+J9WE:UbgvcwYxz6f5+Jh
Threatray 2'069 similar samples on MalwareBazaar
TLSH T178B38D03B5C09871E972193217B4D6769A7FF8215BB0DEAB3B0512390F305F29E39D6A
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter SecuriteInfoCom
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
201
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Trojan.PWS.Stealer.33290.29332.16877
Verdict:
Malicious activity
Analysis date:
2022-07-15 09:55:41 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
56 / 100
Signature
.NET source code references suspicious native API functions
Multi AV Scanner detection for submitted file
Yara detected Generic Downloader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 664907 Sample: SecuriteInfo.com.Trojan.PWS... Startdate: 15/07/2022 Architecture: WINDOWS Score: 56 28 Multi AV Scanner detection for submitted file 2->28 30 .NET source code references suspicious native API functions 2->30 32 Yara detected Generic Downloader 2->32 6 SecuriteInfo.com.Trojan.PWS.Stealer.33290.29332.exe 1 2->6         started        8 dllhost.exe 2 2->8         started        10 dllhost.exe 1 2->10         started        process3 process4 12 MSBuild.exe 16 4 6->12         started        16 WerFault.exe 23 9 6->16         started        18 conhost.exe 6->18         started        20 conhost.exe 8->20         started        22 conhost.exe 10->22         started        dnsIp5 26 yandex.ru 5.255.255.50, 443, 49727 YANDEXRU Russian Federation 12->26 24 C:\Users\user\AppData\Roaming\...\dllhost.exe, PE32 12->24 dropped file6
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2022-07-15 09:53:05 UTC
File Type:
PE (Exe)
AV detection:
18 of 26 (69.23%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Unpacked files
SH256 hash:
23b36cbe0d774877af73bce1eb468db5026f8b4b5b83650baa6fb13beba3e9ac
MD5 hash:
c5d67a98b53d07c90b6bf8a54d87cca3
SHA1 hash:
4cf957464a178b219184308d9110bab3efc3fd78
SH256 hash:
aa13522eb7aa3679ccdfd392edf58e980c55dcca4fe0849c746e331b1268ddc7
MD5 hash:
256220744667f50e5a350127068244d5
SHA1 hash:
67bc2f4beb0a3c112e8de4b90bc5a299281370f1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CAS_Malware_Hunting
Author:Michael Reinprecht
Description:DEMO CAS YARA Rules for sample2.exe
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe aa13522eb7aa3679ccdfd392edf58e980c55dcca4fe0849c746e331b1268ddc7

(this sample)

  
Delivery method
Distributed via web download

Comments