MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ac91b2a2db1909a2c166e243391846ad8d9ede2c6fcfd33b60acf599e48f9afc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 17


Intelligence 17 IOCs YARA 8 File information Comments

SHA256 hash: ac91b2a2db1909a2c166e243391846ad8d9ede2c6fcfd33b60acf599e48f9afc
SHA3-384 hash: 53d6d76e2a2ad35127c17e9e60ff3674d24931638c0af81f40f8eb30fd0b1b875033fe12b9da3a6195244039fe40113a
SHA1 hash: 8ec200e2d836354a62f16cdb3eed4bb760165425
MD5 hash: c213162c86bb943bcdf91b3df381d2f6
humanhash: fillet-social-oven-pasta
File name:c213162c86bb943bcdf91b3df381d2f6.exe
Download: download sample
File size:1'785'344 bytes
First seen:2024-09-30 07:49:45 UTC
Last seen:2024-10-11 21:00:39 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash a89655faa2b6840e801be1e1c779fc67
ssdeep 24576:+rKxoVT2iXc+IZP+6WiaTAsN/3ebTvK+63CWH8iA/iD2hgPjcC8SVdKumYr7:vHZGpdqYH8ia6GcKuR7
Threatray 9 similar samples on MalwareBazaar
TLSH T17D851818F6D8423ED817D235DA3153B2D7FAB9482F20738A69280B5ABF673D01B35758
TrID 39.3% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
28.3% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
9.6% (.EXE) Win32 Executable Delphi generic (14182/79/4)
7.1% (.EXE) Win64 Executable (generic) (10523/12/4)
6.8% (.EXE) DOS Borland compiled Executable (generic) (10000/1/2)
Magika pebin
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
378
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2024-09-27 23:30:45 UTC
Tags:
vidar telegram lumma stealer loader evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
Dropper Patcher
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
89%
Tags:
apt borland_delphi rdpwrap remoteadmin
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RDPWrap Tool
Detection:
malicious
Classification:
spre
Score:
56 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected RDPWrap Tool
Behaviour
Behavior Graph:
Threat name:
Win32.PUA.RDPWrap
Status:
Malicious
First seen:
2024-09-26 16:33:08 UTC
File Type:
PE (Exe)
Extracted files:
15
AV detection:
26 of 38 (68.42%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
System Location Discovery: System Language Discovery
Verdict:
Malicious
Tags:
red_team_tool lazarus lazarus
YARA:
RDPWrap
Unpacked files
SH256 hash:
2f33ed67124a2225104726cb59f001e5ff4d78b0d88a650ced997890b515a73b
MD5 hash:
51b15fc8de1a07851f648ffe4362e5ca
SHA1 hash:
b8215e0a97424eff245eaf196ed4fccd154723b6
SH256 hash:
4c19d053751a68b30c045119642964268659bf79bd066046c32ddb875ec339eb
MD5 hash:
b52ac2b928342ee016739834af802beb
SHA1 hash:
1d4d62475d6ab667fdbc68a46177b7ae01c2ddeb
SH256 hash:
63fb201040002775e6ef6f836a8f0f4d94324fc299c0f9bc1f17a97c6bb24552
MD5 hash:
5505592313b74f2e2c8727837750f66d
SHA1 hash:
d0394cf350090ba4fc68c7e12fd806881b0c42e0
SH256 hash:
ac91b2a2db1909a2c166e243391846ad8d9ede2c6fcfd33b60acf599e48f9afc
MD5 hash:
c213162c86bb943bcdf91b3df381d2f6
SHA1 hash:
8ec200e2d836354a62f16cdb3eed4bb760165425
Detections:
RDPWrap RDPWrap potential_termserv_dll_replacement
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:APT_Lazarus_Loader_Dec_2020_1
Author:Arkbird_SOLG
Description:Detect loader used by Lazarus group in december 2020
Reference:Internal Research
Rule name:Borland
Author:malware-lu
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Mimikatz_Generic
Author:Still
Description:attempts to match all variants of Mimikatz
Rule name:pe_detect_tls_callbacks
Rule name:RDPWrap
Author:@bartblaze
Description:Identifies RDP Wrapper, sometimes used by attackers to maintain persistence.
Reference:https://github.com/stascorp/rdpwrap

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe ac91b2a2db1909a2c166e243391846ad8d9ede2c6fcfd33b60acf599e48f9afc

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
CHECK_TRUST_INFORequires Elevated Execution (level:requireAdministrator)high
Reviews
IDCapabilitiesEvidence
SECURITY_BASE_APIUses Security Base APIadvapi32.dll::AdjustTokenPrivileges
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CreateProcessW
kernel32.dll::OpenProcess
advapi32.dll::OpenProcessToken
kernel32.dll::CloseHandle
wininet.dll::InternetCloseHandle
WIN_BASE_APIUses Win Base APIkernel32.dll::TerminateProcess
kernel32.dll::LoadLibraryA
kernel32.dll::LoadLibraryExW
kernel32.dll::GetSystemInfo
kernel32.dll::GetStartupInfoA
kernel32.dll::GetDiskFreeSpaceW
WIN_BASE_IO_APICan Create Fileskernel32.dll::CreateDirectoryW
kernel32.dll::CreateFileW
kernel32.dll::DeleteFileW
kernel32.dll::GetFileAttributesW
kernel32.dll::FindFirstFileW
kernel32.dll::RemoveDirectoryW
WIN_BASE_USER_APIRetrieves Account Informationadvapi32.dll::LookupPrivilegeValueW
WIN_REG_APICan Manipulate Windows Registryadvapi32.dll::RegConnectRegistryW
advapi32.dll::RegCreateKeyExW
advapi32.dll::RegDeleteKeyW
advapi32.dll::RegLoadKeyW
advapi32.dll::RegOpenKeyExW
advapi32.dll::RegQueryInfoKeyW
WIN_SVC_APICan Manipulate Windows Servicesadvapi32.dll::ChangeServiceConfigW
advapi32.dll::OpenSCManagerW
advapi32.dll::OpenServiceW
advapi32.dll::QueryServiceConfigW
advapi32.dll::StartServiceW

Comments