MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aa1384efaa91d44664e62c9dd9a035553c8f36d229c7745389291846045dc060. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 5 File information Comments

SHA256 hash: aa1384efaa91d44664e62c9dd9a035553c8f36d229c7745389291846045dc060
SHA3-384 hash: 5321c858e69432793fc58ed09f1e1ada6fc511cb54f294a5956d39217d95064f8b73fc94173f863932919510d5affd67
SHA1 hash: 1268a047138a70a583ccc4132d28c8e3c4ad2edb
MD5 hash: 6442ea83cca471bd750e4d53e8d7be7f
humanhash: lithium-colorado-north-april
File name:SecuriteInfo.com.Riskware.Agent.849.759
Download: download sample
File size:2'431'488 bytes
First seen:2022-11-23 23:30:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4852167991c63090f5224cb81d5c299a
ssdeep 49152:FAG+/yeBO7oZLOTDidqV6NEx6JE5rafgf817b4Lpa1sLd0Id:qG+/FBfZLO426NJJEtGgf817b4LpKsLh
Threatray 46 similar samples on MalwareBazaar
TLSH T107B59D2379D18376C4232231853DE2B5E1AAEEF45A3542C766843E2F39B04DF563DA93
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4505/5/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon f4e28c9e86cce0f0
Reporter SecuriteInfoCom
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
182
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Riskware.Agent.849.759
Verdict:
Malicious activity
Analysis date:
2022-11-23 23:33:54 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
DNS request
Sending an HTTP GET request
Sending a custom TCP request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
75%
Tags:
greyware icedid keylogger rat shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
BrowserHistorySpy Tool
Detection:
malicious
Classification:
spyw
Score:
52 / 100
Signature
Multi AV Scanner detection for submitted file
Yara detected BrowserHistorySpy Tool by SecurityXploded
Behaviour
Behavior Graph:
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Unpacked files
SH256 hash:
aa1384efaa91d44664e62c9dd9a035553c8f36d229c7745389291846045dc060
MD5 hash:
6442ea83cca471bd750e4d53e8d7be7f
SHA1 hash:
1268a047138a70a583ccc4132d28c8e3c4ad2edb
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:QbotStuff
Author:anonymous
Rule name:SecurityXploded_Producer_String
Author:Florian Roth
Description:Detects hacktools by SecurityXploded
Reference:http://securityxploded.com/browser-password-dump.php
Rule name:SecurityXploded_Producer_String_RID33B2
Author:Florian Roth
Description:Detects hacktools by SecurityXploded
Reference:http://securityxploded.com/browser-password-dump.php

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments