MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b0d998157a5602c0f97d328b38e82177ceeb380862ac46258c5cb5727bfa7cf7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Nymaim


Vendor detections: 15


Intelligence 15 IOCs YARA File information Comments

SHA256 hash: b0d998157a5602c0f97d328b38e82177ceeb380862ac46258c5cb5727bfa7cf7
SHA3-384 hash: d0df4ed169dad448d2499939ce06b971e4301db802effcfe93ab1ba95d0adf723b8cbe45853df3260f78f5c714d5f93b
SHA1 hash: cc5fb0d3c2ac669a04ce073e2023200107a1846a
MD5 hash: 2010f94a111ab8d9e0a25d7aefd2704e
humanhash: artist-robin-red-butter
File name:2010f94a111ab8d9e0a25d7aefd2704e.exe
Download: download sample
Signature Nymaim
File size:1'755'624 bytes
First seen:2022-10-29 05:05:52 UTC
Last seen:2022-10-29 06:12:35 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 146d746009a5802d63756b726117930a (1 x Nymaim)
ssdeep 24576:GhGyCHW7fOpOQWzYSQ6iRUxgrGEMr3LvDUUk1+CtdEckOOZ2K7bGqvUCSVt:GhGVHWyOrVuUUMrbZk1yckOOZ2fyUtr
Threatray 19 similar samples on MalwareBazaar
TLSH T16F85AEAAB9E1FF4AD8B79439C560B325D12E9C114702498FD3CB3510BEB17E83D66D28
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 736934fc4de8cc92 (4 x Quakbot, 3 x Gozi, 1 x CryptBot)
Reporter abuse_ch
Tags:exe NyMaim signed

Code Signing Certificate

Organisation:Express Track s.r.o.
Issuer:Sectigo Public Code Signing CA R36
Algorithm:sha384WithRSAEncryption
Valid from:2021-12-29T00:00:00Z
Valid to:2022-12-29T23:59:59Z
Serial number: 68d711c6ef85d00e44336faf773e3d0d
Thumbprint Algorithm:SHA256
Thumbprint: 34fbd1ae043871a788059bd89921cd4b5d56bb1abefa8df7141835527ac83182
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
292
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2022-10-29 01:14:11 UTC
Tags:
trojan amadey kelihos loader ransomware stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% directory
Сreating synchronization primitives
Launching a process
Sending a custom TCP request
Searching for synchronization primitives
Creating a file
Changing a file
Replacing files
Moving a recently created file
Moving a file to the %AppData% subdirectory
Creating a file in the %AppData% subdirectories
Unauthorized injection to a system process
Encrypting user's files
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
CheckCmdLine
EvasionQueryPerformanceCounter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed shell32.dll
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Tripoli Ransomware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
rans.evad
Score:
69 / 100
Signature
Allocates memory in foreign processes
Creates files in the recycle bin to hide itself
Deletes itself after installation
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for submitted file
Renames NTDLL to bypass HIPS
Writes a notice file (html or txt) to demand a ransom
Writes many files with high entropy
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 733426 Sample: QgZziwM444.exe Startdate: 29/10/2022 Architecture: WINDOWS Score: 69 56 accounts.google.com 2->56 68 Malicious sample detected (through community Yara rule) 2->68 70 Multi AV Scanner detection for submitted file 2->70 8 QgZziwM444.exe 4 2->8         started        12 explorer.exe 177 2->12         started        14 explorer.exe 2->14 injected 16 OpenWith.exe 2->16         started        signatures3 process4 file5 40 C:\Users\user\AppData\Local\Temp\7648.tmp, PE32 8->40 dropped 42 C:\Users\user\AppData\Local\Temp\75EA.tmp, PE32 8->42 dropped 44 C:\Users\user\AppData\Local\Temp\76B7.tmp, PE32 8->44 dropped 46 C:\Users\user\AppData\Local\Temp\754C.tmp, PE32 8->46 dropped 80 Writes to foreign memory regions 8->80 82 Allocates memory in foreign processes 8->82 84 Renames NTDLL to bypass HIPS 8->84 86 Injects a PE file into a foreign processes 8->86 18 write.exe 4 8->18         started        22 chrome.exe 12->22         started        signatures6 process7 dnsIp8 32 C:\Users\user\AppData\Local\Temp\4576.tmp, PE32 18->32 dropped 34 C:\Users\user\AppData\Local\Temp\4547.tmp, PE32 18->34 dropped 36 C:\Users\user\AppData\Local\Temp\45E5.tmp, PE32 18->36 dropped 38 C:\Users\user\AppData\Local\Temp\44B9.tmp, PE32 18->38 dropped 72 Writes a notice file (html or txt) to demand a ransom 18->72 74 Deletes itself after installation 18->74 76 Renames NTDLL to bypass HIPS 18->76 78 2 other signatures 18->78 25 write.exe 2 212 18->25         started        58 192.168.2.1 unknown unknown 22->58 60 239.255.255.250 unknown Reserved 22->60 29 chrome.exe 22->29         started        file9 signatures10 process11 dnsIp12 48 C:\Users\user\...\MSO1033.acl.rnsmcat4er, data 25->48 dropped 50 C:\Users\user\...\desktop.ini.rnsmcat4er, amd 25->50 dropped 52 C:\Users\user\...\TURABIAN.XSL.rnsmcat4er, data 25->52 dropped 54 85 other files (73 malicious) 25->54 dropped 88 Creates files in the recycle bin to hide itself 25->88 90 Modifies existing user documents (likely ransomware behavior) 25->90 62 clients.l.google.com 142.250.186.174, 443, 49743 GOOGLEUS United States 29->62 64 www.google.com 142.250.186.36, 443, 49746 GOOGLEUS United States 29->64 66 3 other IPs or domains 29->66 file13 signatures14
Threat name:
Win32.Ransomware.Encoder
Status:
Malicious
First seen:
2022-10-28 22:19:12 UTC
File Type:
PE (Exe)
Extracted files:
15
AV detection:
18 of 25 (72.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
ransomware
Behaviour
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetThreadContext
Drops desktop.ini file(s)
Enumerates connected drives
Modifies extensions of user files
Gathering data
Unpacked files
SH256 hash:
6c68d5b0cda819e4063c0afcdc82f1efd69b1d039ea3e341b8c197399fa1499a
MD5 hash:
819bec76f07030daff8e47abfb0e7186
SHA1 hash:
8b4686293873792015843c50ccad924f5d4a6f51
SH256 hash:
1cd9d7d55ff6347d329d9dde83db73cb7b009dc0707d5109b45f87c3e9ff9591
MD5 hash:
0d1c288831241e745e12d9d214560060
SHA1 hash:
a593cfbadc5e0491e7032e43507bb5d9b7b10682
Detections:
win_nymaim_g0 Nymaim win_nymaim_auto
SH256 hash:
7e4c402a392a0cbd2ff31525c6f05ea55acaa13ea4064da88670bf8d0dccef48
MD5 hash:
8e98aadc5a6897ab7d5a7ad15792f8b8
SHA1 hash:
7d53b2f0b36d8af31452d193d2352490994d4f9d
SH256 hash:
aa50a1e524059a4d184933850bc664a6752608a10ba1e876a4802542dc341033
MD5 hash:
42d5422b60e6b5e20e7aaf730a81cc87
SHA1 hash:
e4c5691422f8bb438cae51bdb4340e75efed9f8d
Detections:
win_nymaim_g0 Nymaim win_nymaim_auto
SH256 hash:
b0d998157a5602c0f97d328b38e82177ceeb380862ac46258c5cb5727bfa7cf7
MD5 hash:
2010f94a111ab8d9e0a25d7aefd2704e
SHA1 hash:
cc5fb0d3c2ac669a04ce073e2023200107a1846a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Nymaim

Executable exe b0d998157a5602c0f97d328b38e82177ceeb380862ac46258c5cb5727bfa7cf7

(this sample)

  
Delivery method
Distributed via web download

Comments