MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aec454e782edd3918d12941ea71d35785a50697f67befeb78e6edcf10222df13. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 12


Intelligence 12 IOCs YARA 5 File information Comments

SHA256 hash: aec454e782edd3918d12941ea71d35785a50697f67befeb78e6edcf10222df13
SHA3-384 hash: 2ea3d327b25069f11bc1897b2a6620b39e21d6735f77f5fe74d369e0d1935a50ed92878602e9ea1ef935b69131f353b2
SHA1 hash: 3cee9a0cb084088074ff5b8582159403c035b92d
MD5 hash: 9f34b183155d23a4d6f6ab940f488157
humanhash: white-twelve-mirror-carolina
File name:Akagi32.exe
Download: download sample
File size:96'256 bytes
First seen:2024-12-27 09:25:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 38784af1d8a1aefd02e2a4e48422f070
ssdeep 1536:L+59M+cure420/Y1ckvqPlBi7wd+xpYl7v3XYEGp/Cf2MpWY:S5e+dejqfiTxpYl7fXYL/7MQ
TLSH T1B4935C66F4F84131D6A100331BA9D9962F3ABF244887DD9F6F586E8F1DF0380995D22E
TrID 63.7% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
11.6% (.EXE) Win64 Executable (generic) (10522/11/4)
7.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
5.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.9% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
File icon (PE):PE icon
dhash icon 5092e2d2e2615252 (1 x UACMe)
Reporter Joker
Tags:exe malware trojan

Intelligence


File Origin
# of uploads :
1
# of downloads :
396
Origin country :
GR GR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Akagi32.exe
Verdict:
No threats detected
Analysis date:
2024-12-27 09:38:22 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
virus
Result
Verdict:
Clean
Maliciousness:
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive eventvwr exploit hacktool lolbin microsoft_visual_cc msconfig smb uacme wsreset
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
expl
Score:
80 / 100
Signature
Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected UAC Bypass using CMSTP
Yara detected UACMe UAC Bypass tool
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.PassMarte
Status:
Malicious
First seen:
2024-12-18 08:55:31 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
27 of 38 (71.05%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
System Location Discovery: System Language Discovery
Verdict:
Malicious
Tags:
Win.Tool.Ulise-10001984-0
YARA:
n/a
Unpacked files
SH256 hash:
aec454e782edd3918d12941ea71d35785a50697f67befeb78e6edcf10222df13
MD5 hash:
9f34b183155d23a4d6f6ab940f488157
SHA1 hash:
3cee9a0cb084088074ff5b8582159403c035b92d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:ICMLuaUtil_UACMe_M41
Author:Marius 'f0wL' Genheimer <hello@dissectingmalwa.re>
Description:A Yara rule for UACMe Method 41 -> ICMLuaUtil Elevated COM interface
Reference:https://github.com/hfiref0x/UACME
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
Author:ditekSHen
Description:Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Rule name:RansomPyShield_Antiransomware
Author:XiAnzheng
Description:Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe aec454e782edd3918d12941ea71d35785a50697f67befeb78e6edcf10222df13

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User Authorizationntdll.dll::RtlAllocateAndInitializeSid
ADVAPI32.dll::CreateWellKnownSid
ntdll.dll::RtlFreeSid
ntdll.dll::RtlInitializeSid
ADVAPI32.dll::RevertToSelf
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
KERNEL_APIManipulates Windows Kernel & Driversntdll.dll::RtlInitUnicodeString
RPC_APICan Execute Remote ProceduresRPCRT4.dll::RpcAsyncCompleteCall
RPCRT4.dll::RpcAsyncInitializeHandle
RPCRT4.dll::RpcBindingFree
RPCRT4.dll::RpcBindingFromStringBindingW
RPCRT4.dll::RpcBindingSetAuthInfoExW
RPCRT4.dll::RpcRaiseException
SECURITY_BASE_APIUses Security Base APIntdll.dll::NtDuplicateToken
ADVAPI32.dll::ImpersonateLoggedOnUser
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteExW
SS_APIUses SS APISecur32.dll::AcceptSecurityContext
Secur32.dll::AcquireCredentialsHandleW
Secur32.dll::DeleteSecurityContext
Secur32.dll::QuerySecurityContextToken
WIN32_PROCESS_APICan Create Process and ThreadsADVAPI32.dll::CreateProcessAsUserW
KERNEL32.dll::CreateProcessW
ntdll.dll::NtOpenProcessToken
ntdll.dll::NtOpenProcess
ntdll.dll::NtOpenThreadToken
KERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
ntdll.dll::NtTerminateProcess
ntdll.dll::NtQueryInformationProcess
ntdll.dll::NtQuerySystemInformation
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExW
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileW
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileA
KERNEL32.dll::CreateFileW
ntdll.dll::NtCreateFile
KERNEL32.dll::DeleteFileA
KERNEL32.dll::DeleteFileW
ntdll.dll::NtDeleteFile
WIN_BCRYPT_APICan Encrypt Filesbcrypt.dll::BCryptDecrypt
bcrypt.dll::BCryptDestroyKey
bcrypt.dll::BCryptGenerateSymmetricKey
bcrypt.dll::BCryptGetProperty
bcrypt.dll::BCryptOpenAlgorithmProvider
bcrypt.dll::BCryptCloseAlgorithmProvider
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyW
ADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegOpenKeyW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegSetKeyValueW
WIN_SVC_APICan Manipulate Windows ServicesADVAPI32.dll::OpenSCManagerW
ADVAPI32.dll::OpenServiceW
ADVAPI32.dll::QueryServiceStatusEx
ADVAPI32.dll::StartServiceW

Comments