MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aaf0dbf15a07c8e9947e3e0768edb706467487348aa2ce00fbb9a43f95eef52c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA 2 File information Comments

SHA256 hash: aaf0dbf15a07c8e9947e3e0768edb706467487348aa2ce00fbb9a43f95eef52c
SHA3-384 hash: 1dd4e974027d23704b95beb64280bd3d7f4d785e4e3b3af1368991caf2215d7b0fad6259338f33682d281d5d509ea4a4
SHA1 hash: c7115040a679bc6a1ca8bd93419efa829249c850
MD5 hash: be04acf6fd1521e16cc12bf090d6896e
humanhash: aspen-uniform-island-lithium
File name:d26MK91wdA0yw1lG5uaK.exe
Download: download sample
File size:1'736'708 bytes
First seen:2021-05-05 11:30:12 UTC
Last seen:2021-05-05 13:21:59 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 29d41f4be522c34c9ff2d81aebbd845b
ssdeep 24576:dXCc7GETrzwZmnrR3u9opW/SXd1mZFFYxxpadAbT0jeM9KkzR/JCqJZtD684aje:gETSmnrRWIW/f7nOT0iUzR/wG684Qe
Threatray 3 similar samples on MalwareBazaar
TLSH B885F1296390C86CF0F711F6D5F25A9C0CE57F9367A966DB0AD40C4B9AB08EAC434397
Reporter starsSk87264403

Intelligence


File Origin
# of uploads :
2
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Using the Windows Management Instrumentation requests
Sending a UDP request
Searching for analyzing tools
Connection attempt
Sending an HTTP POST request
Creating a file in the %AppData% directory
Deleting a recently created file
Replacing files
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Infostealer.ClipBanker
Status:
Malicious
First seen:
2021-05-02 17:38:45 UTC
AV detection:
26 of 47 (55.32%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Modifies registry class
Script User-Agent
Suspicious use of AdjustPrivilegeToken
Checks BIOS information in registry
Unpacked files
SH256 hash:
20a965e231d0f801a36d99d65512a8f3800df65d1e85a1e0ed73f1fd3a89be20
MD5 hash:
442fdcbf0a0457164986cc6d294d9a3c
SHA1 hash:
48ee5f4a5edf40ffaec1d709aea57dd2e001513d
SH256 hash:
aaf0dbf15a07c8e9947e3e0768edb706467487348aa2ce00fbb9a43f95eef52c
MD5 hash:
be04acf6fd1521e16cc12bf090d6896e
SHA1 hash:
c7115040a679bc6a1ca8bd93419efa829249c850
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments