MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b0912554158dfc4bad48096f61b9312405ee97e802447fdfa52ed64ee4bf023d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: b0912554158dfc4bad48096f61b9312405ee97e802447fdfa52ed64ee4bf023d
SHA3-384 hash: 3bf96fca5d2568517e1c4f02feffa879fe92a959ac9cceda54a5c4d1a3e25ea3c3d2bc8093b6c42f64e6be58577612ca
SHA1 hash: 2263f3eeea7220a5f9a7ef352bf665b5aa9961bd
MD5 hash: 8a6a713c78c6861b78843aa65e7f2fe7
humanhash: magazine-foxtrot-king-lemon
File name:asidvtjepx.exe
Download: download sample
File size:434'688 bytes
First seen:2021-08-26 13:49:53 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b211bec2627ea9b5322d60ef3ed97e1a (2 x BazaLoader)
ssdeep 12288:yscul4pIq9bNOEI93u23mDez6BRB0ixC:yu+qYRhw3zq7uX
Threatray 22 similar samples on MalwareBazaar
TLSH T17D9402E711B16351F8A514BBB459E30AB853F5D3827DB3E382DC5EC0903AE4922DDE68
Reporter Anonymous
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
144
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
asidvtjepx.exe
Verdict:
No threats detected
Analysis date:
2021-08-26 13:52:01 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Sending a UDP request
Running batch commands
Creating a process with a hidden window
Launching a process
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
88 / 100
Signature
Creates an autostart registry key pointing to binary in C:\Windows
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Sigma detected: CobaltStrike Load by Rundll32
Sigma detected: CobaltStrike Process Patterns
Sigma detected: UNC2452 Process Creation Patterns
Uses cmd line tools excessively to alter registry or file data
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 472254 Sample: asidvtjepx.exe Startdate: 26/08/2021 Architecture: WINDOWS Score: 88 91 Sigma detected: UNC2452 Process Creation Patterns 2->91 93 Sigma detected: CobaltStrike Load by Rundll32 2->93 95 Sigma detected: CobaltStrike Process Patterns 2->95 12 loaddll64.exe 1 2->12         started        14 rundll32.exe 2->14         started        16 rundll32.exe 2->16         started        process3 process4 18 rundll32.exe 12->18         started        20 cmd.exe 1 12->20         started        23 rundll32.exe 12->23         started        25 4 other processes 12->25 signatures5 27 cmd.exe 1 18->27         started        97 Uses ping.exe to sleep 20->97 99 Uses cmd line tools excessively to alter registry or file data 20->99 101 Uses ping.exe to check the status of other devices and networks 20->101 31 rundll32.exe 20->31         started        33 cmd.exe 1 23->33         started        process6 dnsIp7 85 127.0.0.1 unknown unknown 27->85 113 Uses ping.exe to sleep 27->113 35 rundll32.exe 3 27->35         started        38 conhost.exe 27->38         started        40 PING.EXE 1 27->40         started        42 rundll32.exe 33->42         started        44 conhost.exe 33->44         started        46 PING.EXE 1 33->46         started        signatures8 process9 file10 83 C:\Users\user\AppData\...\uluasvpuifl.exe, PE32+ 35->83 dropped 48 cmd.exe 1 35->48         started        51 cmd.exe 1 35->51         started        53 cmd.exe 1 35->53         started        process11 signatures12 87 Uses ping.exe to sleep 48->87 55 rundll32.exe 48->55         started        58 conhost.exe 48->58         started        60 PING.EXE 1 48->60         started        89 Uses cmd line tools excessively to alter registry or file data 51->89 62 reg.exe 1 1 51->62         started        64 conhost.exe 51->64         started        66 conhost.exe 53->66         started        process13 signatures14 105 Writes to foreign memory regions 55->105 107 Modifies the context of a thread in another process (thread injection) 55->107 109 Injects a PE file into a foreign processes 55->109 68 cmd.exe 1 55->68         started        71 cmd.exe 1 55->71         started        73 chrome.exe 55->73         started        111 Creates an autostart registry key pointing to binary in C:\Windows 62->111 process15 signatures16 103 Uses cmd line tools excessively to alter registry or file data 68->103 75 reg.exe 1 68->75         started        77 conhost.exe 68->77         started        79 conhost.exe 71->79         started        81 reg.exe 1 71->81         started        process17
Threat name:
Win64.Trojan.Razy
Status:
Malicious
First seen:
2021-08-26 13:50:13 UTC
AV detection:
5 of 46 (10.87%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Runs ping.exe
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
b0912554158dfc4bad48096f61b9312405ee97e802447fdfa52ed64ee4bf023d
MD5 hash:
8a6a713c78c6861b78843aa65e7f2fe7
SHA1 hash:
2263f3eeea7220a5f9a7ef352bf665b5aa9961bd
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via e-mail link

Comments