MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b1a705cc5dadd4aece01bedec08657b96398d09e610d99cd14f0896825d70d09. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cutwail


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: b1a705cc5dadd4aece01bedec08657b96398d09e610d99cd14f0896825d70d09
SHA3-384 hash: 46b6fa7d8d4777d1bca5d1e09e32fd1ae1640a11969e76a2b06c0e37521215f58e5b928a2b7fcf4e25c47868a6d89e30
SHA1 hash: bdeb02c27daf804f8fad93106f31ca0f197b4b78
MD5 hash: 0a186fa4a91ce443a5a3d0e78cc3fecd
humanhash: golf-april-mississippi-whiskey
File name:0a186fa4a91ce443a5a3d0e78cc3fecd.exe
Download: download sample
Signature Cutwail
File size:288'256 bytes
First seen:2023-01-11 15:57:01 UTC
Last seen:2023-01-11 17:32:56 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1170972bab2bb311af28ba139b2b33a2 (1 x Cutwail)
ssdeep 3072:h5QPa45Ov1oO37aoZ72yqvUlgr2W4R5LsvfB1m9k5ayy7ND4L5+TDbwfSSSSSSzi:LQJ0f37HqvsW4RivfB0F163/S8aF9Z9
Threatray 14 similar samples on MalwareBazaar
TLSH T10B548D30EA90C038F4F755F449B967BC642D7EA0877884CF52D956EA92346E8EE30753
TrID 39.4% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.5% (.SCR) Windows screen saver (13097/50/3)
13.3% (.EXE) Win64 Executable (generic) (10523/12/4)
8.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter abuse_ch
Tags:Cutwail exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
199
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-01-11 08:50:26 UTC
Tags:
trojan loader smoke sinkhole

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Сreating synchronization primitives
Creating a file
Enabling the 'hidden' option for recently created files
DNS request
Sending an HTTP POST request
Launching a process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Sending an HTTP POST request to an infection source
Unauthorized injection to a system process
Verdict:
No Threat
Threat level:
  2/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Drops PE files to the user root directory
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to resolve many domain names, but no domain seems valid
Writes to foreign memory regions
Yara detected Backdoor Pushdo
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 782450 Sample: 1EsDtA4mep.exe Startdate: 11/01/2023 Architecture: WINDOWS Score: 100 45 www.sclover3.com 2->45 47 www.reglera.com 2->47 49 220 other IPs or domains 2->49 75 Snort IDS alert for network traffic 2->75 77 Antivirus detection for URL or domain 2->77 79 Multi AV Scanner detection for submitted file 2->79 83 2 other signatures 2->83 8 1EsDtA4mep.exe 3 68 2->8         started        13 pigalicapi.exe 48 2->13         started        15 pigalicapi.exe 48 2->15         started        signatures3 81 Tries to resolve many domain names, but no domain seems valid 47->81 process4 dnsIp5 51 mackusick.com 8->51 53 www.jenco.co.uk 104.21.23.9, 49697, 49773, 49818 CLOUDFLARENETUS United States 8->53 59 191 other IPs or domains 8->59 29 C:\Users\user\pigalicapi.exe, PE32 8->29 dropped 31 C:\Users\...\pigalicapi.exe:Zone.Identifier, ASCII 8->31 dropped 85 Contains functionality to inject threads in other processes 8->85 87 Drops PE files to the user root directory 8->87 89 Contains functionality to inject code into remote processes 8->89 99 3 other signatures 8->99 17 svchost.exe 8->17         started        55 www.dayvo.com 188.114.96.3, 25, 443, 49779 CLOUDFLARENETUS European Union 13->55 61 132 other IPs or domains 13->61 91 Multi AV Scanner detection for dropped file 13->91 93 Machine Learning detection for dropped file 13->93 95 Found stalling execution ending in API Sleep call 13->95 21 svchost.exe 13->21         started        57 www.tc17.com 15->57 63 120 other IPs or domains 15->63 23 svchost.exe 15->23         started        file6 97 System process connects to network (likely due to code injection or exploit) 57->97 signatures7 process8 dnsIp9 33 smtp1.sbc.mail.am0.yahoodns.net 66.218.88.163, 25, 49929, 50043 YAHOO-3US United States 17->33 35 smtp.sbcglobal.yahoo.com 17->35 41 2 other IPs or domains 17->41 71 System process connects to network (likely due to code injection or exploit) 17->71 73 Injects a PE file into a foreign processes 17->73 25 svchost.exe 12 17->25         started        37 185.205.70.128, 25, 50051 DEVINOTELECOM-ASRU unknown 21->37 39 mail.airmail.net 66.226.70.66, 25, 50085, 65188 INFB2-ASUS United States 21->39 43 2 other IPs or domains 21->43 signatures10 process11 dnsIp12 65 nts-web.net 25->65 67 flamingorecordings.com 25->67 69 37 other IPs or domains 25->69 101 System process connects to network (likely due to code injection or exploit) 25->101 signatures13
Threat name:
Win32.Trojan.Cutwail
Status:
Malicious
First seen:
2023-01-11 10:26:28 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
18 of 26 (69.23%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
UPX packed file
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
1c7b41be9c64b57aacb0c640ec73d53c8f0bf8975f5c6601d98d92c25b5968af
MD5 hash:
d0f5a79ecbbe532696a85162f08a63f9
SHA1 hash:
e259bcf1f84f3e771e60c73a28d13ae43b96d949
Detections:
win_pushdo_auto
SH256 hash:
f812cff25ac78391ad0621231aa8556d459a3cea3205a04b097744f1e0116a60
MD5 hash:
ab0fa68fdf4a67b3a404250f073e15ba
SHA1 hash:
7eb499acfbe7a3d4d536ab2de8e95be4d7234bbf
SH256 hash:
b1a705cc5dadd4aece01bedec08657b96398d09e610d99cd14f0896825d70d09
MD5 hash:
0a186fa4a91ce443a5a3d0e78cc3fecd
SHA1 hash:
bdeb02c27daf804f8fad93106f31ca0f197b4b78
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:win_pushdo_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.pushdo.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Cutwail

Executable exe b1a705cc5dadd4aece01bedec08657b96398d09e610d99cd14f0896825d70d09

(this sample)

  
Delivery method
Distributed via web download

Comments