MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ac696ef5a12039b72e408b6b14e08823c407ee652a6a36b7c33d01cd8d373497. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: ac696ef5a12039b72e408b6b14e08823c407ee652a6a36b7c33d01cd8d373497
SHA3-384 hash: dee0591187dce8b270af5f6b410c02d5514c110d2b7dc98b13efaa51cdfec297bf09189bd8c7a893c4a42ab7960e5578
SHA1 hash: 03c1c428cb2b478a7e9babec460795eb897c464b
MD5 hash: 67c2474a2fb201491c0ff5ff7ab783ea
humanhash: fruit-speaker-michigan-comet
File name:AnnualReport-17.12.exe
Download: download sample
File size:588'120 bytes
First seen:2020-12-17 19:54:22 UTC
Last seen:2020-12-17 21:51:09 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash cd93f429d031a34e98b5671cceb32a0b
ssdeep 12288:Oiu9UaIinYq2S4mgpe2Jfjp7rB5/g+CR0AdzdzeNgFU5YorZW:du9kinYq/b2Jpv/gxRzdTkY2ZW
Threatray 169 similar samples on MalwareBazaar
TLSH FEC4AF83B14430DCF4EF433BE9D64E25A6E2BC170A525E0911747FB5BF322909BD962A
Reporter James_inthe_box
Tags:exe

Code Signing Certificate

Organisation:COMODO RSA Extended Validation Code Signing CA
Issuer:COMODO RSA Certification Authority
Algorithm:sha384WithRSAEncryption
Valid from:Dec 3 00:00:00 2014 GMT
Valid to:Dec 2 23:59:59 2029 GMT
Serial number: 6DD472EB02AE0406E3DD843F5FE145E1
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: D1863B55A0629F32A5DAD867D02DF1D1A4550B23AC422B53581E79E548FD6617
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
112
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://sosefinawinnifredsullivan8-5ce0e.gr8.com/
Verdict:
Malicious activity
Analysis date:
2020-12-17 19:52:58 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
68 / 100
Signature
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Writes to foreign memory regions
Behaviour
Behavior Graph:
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Suspicious use of NtCreateUserProcessOtherParentProcess
Unpacked files
SH256 hash:
ac696ef5a12039b72e408b6b14e08823c407ee652a6a36b7c33d01cd8d373497
MD5 hash:
67c2474a2fb201491c0ff5ff7ab783ea
SHA1 hash:
03c1c428cb2b478a7e9babec460795eb897c464b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Cobalt_functions
Author:@j0sm1
Description:Detect functions coded with ROR edi,D; Detect CobaltStrike used by differents groups APT

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments