MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 acd957cbaa42734fe2e702d373b6a84292da0f25d25a35e294bec2e2d6543d8e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments 1

SHA256 hash: acd957cbaa42734fe2e702d373b6a84292da0f25d25a35e294bec2e2d6543d8e
SHA3-384 hash: 1b44e1c7486c8a808460e84b54d6e6e870d0cde4ada82f9a9c061c044ca784356340fee529c0d646bd305f62202a3044
SHA1 hash: 708020d647d912371e1b449458bfd68cd9a08cc3
MD5 hash: 21a54adf75595b0d332b4201b1508b04
humanhash: eleven-xray-eleven-eight
File name:acd957cbaa42734fe2e702d373b6a84292da0f25d25a35e294bec2e2d6543d8e
Download: download sample
File size:9'813'964 bytes
First seen:2021-04-12 18:13:21 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 38cec625fecfa77d86b81445b2b79675
ssdeep 196608:ZzXuF1rMZHAsmBXGitbYPvbJQlHmYu8CxqZ8iTmXlm:IF1YgNGikJQlGmZm
Threatray 20 similar samples on MalwareBazaar
TLSH 7AA63302AC824839CC6ACE371CF8E9FD146BED159B1C14D256887CF12D97F94ADB7129
Reporter Anonymous

Intelligence


File Origin
# of uploads :
1
# of downloads :
117
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Valorant Account Generator.exe
Verdict:
Malicious activity
Analysis date:
2021-04-12 17:15:29 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
DNS request
Sending a custom TCP request
Creating a file
Deleting a recently created file
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw
Score:
56 / 100
Signature
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Disco
Status:
Malicious
First seen:
2020-04-28 04:08:06 UTC
AV detection:
10 of 27 (37.04%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
pyinstaller spyware stealer
Behaviour
Suspicious use of WriteProcessMemory
Looks up external IP address via web service
Loads dropped DLL
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
9d4de1c8c927aa24a8337c1fb27ab2dab28db86e94a8b3f5101f5144cde0dac3
MD5 hash:
4946aba8ee2a2ec978a5acb23f508662
SHA1 hash:
150183032efdaeca67b7eacb4edd9401ddaa7f39
SH256 hash:
44afa2c97c35172a4c31b1faa5c5f5a7e1c1991a6b1ff2fa1bde9acd93eeaf3e
MD5 hash:
444e83632b330c31b0259eb2c08d48ff
SHA1 hash:
210bb1d9e74d55f21ea4be35cff550906056d878
SH256 hash:
513cef2181cd002a675f4e75164833c1264ee87d66b19d3e04a02d16df189db8
MD5 hash:
f4f0b88cf6a221740fe1e49f8813248b
SHA1 hash:
247550e003860895bc9842cef8f31b6a5702e367
SH256 hash:
8b428b08ad5b3dad407af5072c18460056db5d422165bb80a34f72da0bd0cc0b
MD5 hash:
9d45b37f018d71dff08cb16a9a857275
SHA1 hash:
5af8b1c4b083ee432a347c7c6b19180a725f6f1d
SH256 hash:
1e70835cd2a366c35d7e16b267a79b69f5a732eea9c6e3d24f84054b085f0787
MD5 hash:
6b32c458d010da0567519b8f3b0a30b1
SHA1 hash:
63fb791c9452988a5873131c331afc87448cf327
SH256 hash:
828a7f09852fc4332b2795a5ba8e8fcfcdea262a00a4cfc73a09945dac88a378
MD5 hash:
5365771a8e2ac66ff64768c06a70fd46
SHA1 hash:
82eeb939303d11430624da746dc3a79296031c74
SH256 hash:
c1e2f1f003b2c3cbc181a44d84044d41f0be1443feefb5de48e9e98815ec5b8b
MD5 hash:
fb4375e637483b4b5a173fe37cf01336
SHA1 hash:
a6e9fa0f7a7905dc78f382a47dede2b8a365b349
SH256 hash:
77a1c002331bdfec59a3c91e518f86cf33598d613f81f9c7f074fa78765085b9
MD5 hash:
1245e49fafcc1077c269065ae3860d06
SHA1 hash:
a7023c21d09e85f0b23f3c54a6eee177195c02a6
SH256 hash:
87c156ac99c47d376a3d7818dd574f915ef83f6d9743f646c1fa3a937368c232
MD5 hash:
0d43c49a10e3af892a3076ea4a84353d
SHA1 hash:
e6be82884853b56ea10a33ea75dd5ce49d5fb539
SH256 hash:
9551b7231829da25df44b7b9d77bfce567b73a663e965c134f47a9ae66c11b41
MD5 hash:
7cf63135fa8d4a45a3414991ec293978
SHA1 hash:
e7a236d1d6523312c2af0cd7f2242e33ee5038ed
SH256 hash:
db065368f2d310383184cbd95b91356fbd8c26cdad0105901c3fcd370707b155
MD5 hash:
8addb167baaef748b0aea3249fd763bd
SHA1 hash:
eacec818dc69baa5fa618d52ffec507c31c4b64b
SH256 hash:
1e74b9382c79fa3681c8f44c1ec4661193b1f1639b7b286ce46f5feb45f92e0a
MD5 hash:
2e8e33fcf16bed21570ccabc1bc3a742
SHA1 hash:
4513e0098ae453946192d77f1d706f9d7fe97e26
SH256 hash:
8ad8c41c46d0840390ad8c3039d9bb1b97c3629303a8b622655ed527b1f0370d
MD5 hash:
c3163f70d5cb6ec86c4021769066eeb6
SHA1 hash:
4c065cb244b43a2f0de4827941b5ae57f987136e
SH256 hash:
433dd4b766a18bc7fd8eae9c0c90889a28860cc78d8ea202074303ccdc0bd4cd
MD5 hash:
b8335aadb7a746928fe55d6eb6324ac3
SHA1 hash:
22bdf6aaba02662127bab1bbe4e73100ac024cc3
SH256 hash:
12e5e77d75a716da924623a7db4ad6c6d52dff0d1f0148df54a6e02a7b53192f
MD5 hash:
86d602103ff492570e566c7788346e9a
SHA1 hash:
cd34f56b02a83143a89aed9b41372c87a09b644e
SH256 hash:
4ceba5eeb4bc2e8e3c19277449f56c5fd0f618c172966fa4d71acbb1d8559180
MD5 hash:
0fb217a03f7166f535820d4cf709be55
SHA1 hash:
def070b7bd653e65947548f3ef7744b85d28e45b
SH256 hash:
3f2f5087b816848a8efb21aefd9514e75198d89f7f9be63e3c6d533b29c69b8e
MD5 hash:
fc933a334dead4ed5aaead97dbc3a126
SHA1 hash:
dd4af176d2e0d13fccf4b2e4445a57dd84ba6674
SH256 hash:
acd957cbaa42734fe2e702d373b6a84292da0f25d25a35e294bec2e2d6543d8e
MD5 hash:
21a54adf75595b0d332b4201b1508b04
SHA1 hash:
708020d647d912371e1b449458bfd68cd9a08cc3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:PE_File_pyinstaller
Author:Didier Stevens (https://DidierStevens.com)
Description:Detect PE file produced by pyinstaller
Reference:https://isc.sans.edu/diary/21057
Rule name:PyInstaller
Author:@bartblaze
Description:Identifies executable converted using PyInstaller.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-04-14 16:28:52 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0009] Anti-Behavioral Analysis::Virtual Machine Detection
1) [C0032.005] Data Micro-objective::Adler::Checksum
2) [C0060] Data Micro-objective::Compression Library
3) [C0026.002] Data Micro-objective::XOR::Encode Data
5) [C0046] File System Micro-objective::Create Directory
6) [C0048] File System Micro-objective::Delete Directory
7) [C0047] File System Micro-objective::Delete File
8) [C0051] File System Micro-objective::Read File
9) [C0052] File System Micro-objective::Writes File
10) [C0034.001] Operating System Micro-objective::Set Variable::Environment Variable
11) [C0040] Process Micro-objective::Allocate Thread Local Storage
12) [C0017] Process Micro-objective::Create Process
13) [C0041] Process Micro-objective::Set Thread Local Storage Value
14) [C0018] Process Micro-objective::Terminate Process