MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ad28a67a8f31c9cc363e1dd27ea9e226de97ead72ca696a7911b8d65b4e9a8fc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA 1 File information Comments

SHA256 hash: ad28a67a8f31c9cc363e1dd27ea9e226de97ead72ca696a7911b8d65b4e9a8fc
SHA3-384 hash: 050af35fdc40881d6abcc983ad641929769fde13b2ee8aba83e5387546316774db04768dc8a8553be19aad11df9ddaab
SHA1 hash: e945b4dcf9e82a57abd50d06a4cb28bbc34cb32a
MD5 hash: 02f1aa1bfae7f3f070416fbb32236b78
humanhash: twelve-steak-south-johnny
File name:8109f3c3c81af8f1356e604b491dd061
Download: download sample
File size:5'810'176 bytes
First seen:2020-11-17 11:54:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 93a138801d9601e4c36e6274c8b9d111 (11 x CobaltStrike, 9 x Snatch, 8 x LaplasClipper)
ssdeep 98304:JIE+0OHR3l/5bvshSQ0tc1H0os+At7bkPOA986Dn8MjEu65KI:Jy0c1ShwGHCbE9jD8Fu65
Threatray 40 similar samples on MalwareBazaar
TLSH BA468C50F9DF64F5EB83463049B6A27F7334A1098325DFC3DA448EABF8576D60A32252
Reporter seifreed

Intelligence


File Origin
# of uploads :
1
# of downloads :
54
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
DNS request
Sending an HTTP GET request
Threat name:
Win32.Trojan.Ymacco
Status:
Malicious
First seen:
2020-11-17 11:57:05 UTC
AV detection:
17 of 28 (60.71%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
GoLang User-Agent
Looks up external IP address via web service
Unpacked files
SH256 hash:
ad28a67a8f31c9cc363e1dd27ea9e226de97ead72ca696a7911b8d65b4e9a8fc
MD5 hash:
02f1aa1bfae7f3f070416fbb32236b78
SHA1 hash:
e945b4dcf9e82a57abd50d06a4cb28bbc34cb32a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments