MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ab175c1c5de8c9e9a2cbe7a9a14dac53371df20aa680f9df1cf7ca9939b60bbc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: ab175c1c5de8c9e9a2cbe7a9a14dac53371df20aa680f9df1cf7ca9939b60bbc
SHA3-384 hash: c043cd6d8ee31c70e1e641935078c217b011519f2398b27b01fb618c6fe7d5da403256a1109451bf4442f9bea8d021bc
SHA1 hash: db0bc4d297db510c4ca0f471be18fd93b044f082
MD5 hash: 7e2553a136d23ed2827604fa1c987158
humanhash: jersey-don-spring-magnesium
File name:SecuriteInfo.com.Variant.Lazy.231082.27845.16396
Download: download sample
File size:3'976'192 bytes
First seen:2022-12-11 07:27:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6ed4f5f04d62b18d96b26d6db7c18840 (391 x SalatStealer, 78 x BitRAT, 42 x RedLineStealer)
ssdeep 98304:U0x0cEqbESDO6XG22f5I6VlReIi0cpIAUELY8TFfTGFjS7l8p:U1sESDOY2f1lRe9NHLYMFfTGFjOOp
Threatray 3'504 similar samples on MalwareBazaar
TLSH T12F06339DA80A6390E6360D3DA3F96A08718C177CA50D6D5717F2F69CCBB782881F2D5C
TrID 86.3% (.EXE) UPX compressed Win64 Executable (70117/5/12)
6.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
2.4% (.EXE) OS/2 Executable (generic) (2029/13)
2.4% (.EXE) Generic Win/DOS Executable (2002/3)
2.4% (.EXE) DOS Executable Generic (2000/1)
Reporter SecuriteInfoCom
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
172
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Searching for the window
DNS request
Creating a file in the %temp% directory
Running batch commands
Launching a process
Windows shutdown
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
ngrok-server
Verdict:
Suspicious
Result
Threat name:
Unknown
Detection:
clean
Classification:
n/a
Score:
2 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win64.Trojan.Lazy
Status:
Malicious
First seen:
2022-12-11 07:28:16 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
14 of 26 (53.85%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
Modifies data under HKEY_USERS
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
UPX packed file
Unpacked files
SH256 hash:
981e4627bb60165cb98040d40ab7000f4e0b0633abe1f3902482f3cb648f67a8
MD5 hash:
0b16707a14d5e57eb63787aa9afdd5bf
SHA1 hash:
e2aa65a55d36c16686f6c5ad80780d32e6e3a94c
SH256 hash:
ab175c1c5de8c9e9a2cbe7a9a14dac53371df20aa680f9df1cf7ca9939b60bbc
MD5 hash:
7e2553a136d23ed2827604fa1c987158
SHA1 hash:
db0bc4d297db510c4ca0f471be18fd93b044f082
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments