MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b20984771f38828a83e820177f49ed9bd3c1f7d4e0074c3e98fea8e9b2aee59f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cutwail


Vendor detections: 13


Intelligence 13 IOCs YARA 1 File information Comments

SHA256 hash: b20984771f38828a83e820177f49ed9bd3c1f7d4e0074c3e98fea8e9b2aee59f
SHA3-384 hash: 26f7feaae91d998bfedb2badd8d2e503f66e4c3cd123262ff9829e3aa8832c06e25fd6800c448b5422c3aba70587d951
SHA1 hash: c36591601e8edc0bd9ddf91c496262d354210601
MD5 hash: b9157cd95bfaaaf53a58039b26630cd2
humanhash: island-burger-one-failed
File name:b9157cd95bfaaaf53a58039b26630cd2.exe
Download: download sample
Signature Cutwail
File size:712'704 bytes
First seen:2022-11-30 18:18:23 UTC
Last seen:2022-11-30 19:27:59 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2b67c0a5dab9c0e87c03d5ec88c0c33c (1 x Cutwail)
ssdeep 12288:jN4QOYjMdFdORQeVxHafYJ3sqahTMXbrrMDTyZ:jN4QOY6GRQeVxoALMW
Threatray 13 similar samples on MalwareBazaar
TLSH T14AE4BF4E1D67420AC97E5CF9860576234E6FD4E863CA02CBD17E22BC09E62C4E776B74
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4505/5/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter abuse_ch
Tags:Cutwail exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
193
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
b9157cd95bfaaaf53a58039b26630cd2.exe
Verdict:
Malicious activity
Analysis date:
2022-11-30 19:04:46 UTC
Tags:
trojan sinkhole

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to resolve many domain names, but no domain seems valid
Writes to foreign memory regions
Yara detected Backdoor Pushdo
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 757033 Sample: 0fmEh2zmDj.exe Startdate: 30/11/2022 Architecture: WINDOWS Score: 100 33 www.wkhk.net 2->33 35 www.synetik.net 2->35 37 176 other IPs or domains 2->37 71 Snort IDS alert for network traffic 2->71 73 Antivirus detection for URL or domain 2->73 75 Multi AV Scanner detection for submitted file 2->75 79 2 other signatures 2->79 8 0fmEh2zmDj.exe 3 68 2->8         started        13 pigalicapi.exe 45 2->13         started        15 pigalicapi.exe 48 2->15         started        signatures3 77 Tries to resolve many domain names, but no domain seems valid 35->77 process4 dnsIp5 45 www.reglera.com 8->45 47 www.mobilnic.net 8->47 53 186 other IPs or domains 8->53 29 C:\Users\user\pigalicapi.exe, PE32 8->29 dropped 31 C:\Users\...\pigalicapi.exe:Zone.Identifier, ASCII 8->31 dropped 81 Detected unpacking (changes PE section rights) 8->81 83 Detected unpacking (overwrites its own PE header) 8->83 85 Contains functionality to inject threads in other processes 8->85 97 3 other signatures 8->97 17 svchost.exe 8->17         started        55 118 other IPs or domains 13->55 87 Multi AV Scanner detection for dropped file 13->87 89 Machine Learning detection for dropped file 13->89 91 Writes to foreign memory regions 13->91 20 svchost.exe 13->20         started        49 sjbmw.com 15->49 51 185.15.129.58, 80 WAYCOM-ASWaycomInternational-EuropeanNetworkFR France 15->51 57 112 other IPs or domains 15->57 93 Injects a PE file into a foreign processes 15->93 23 svchost.exe 15->23         started        file6 95 Tries to resolve many domain names, but no domain seems valid 49->95 signatures7 process8 dnsIp9 65 Contains functionality to inject threads in other processes 17->65 39 185.205.70.128, 25, 50049, 50230 DEVINOTELECOM-ASRU unknown 20->39 41 mail.airmail.net 66.226.70.66, 25, 50057 INFB2-ASUS United States 20->41 43 2 other IPs or domains 20->43 67 System process connects to network (likely due to code injection or exploit) 20->67 69 Injects a PE file into a foreign processes 20->69 25 svchost.exe 12 20->25         started        signatures10 process11 dnsIp12 59 metaforacom.com 25->59 61 impexnc.com 25->61 63 14 other IPs or domains 25->63 99 System process connects to network (likely due to code injection or exploit) 25->99 signatures13
Threat name:
Win32.Trojan.Cutwail
Status:
Malicious
First seen:
2022-11-30 09:50:41 UTC
File Type:
PE (Exe)
AV detection:
16 of 26 (61.54%)
Threat level:
  5/5
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
f812cff25ac78391ad0621231aa8556d459a3cea3205a04b097744f1e0116a60
MD5 hash:
ab0fa68fdf4a67b3a404250f073e15ba
SHA1 hash:
7eb499acfbe7a3d4d536ab2de8e95be4d7234bbf
SH256 hash:
06fe27d413ab15cd98d6aad107295d36c1253c37868d330be532870c158a6e6b
MD5 hash:
666fa9ec709284dbf330430e80c94119
SHA1 hash:
a1db44d7d70a4833748a94061ac2c9e08ff9528e
Detections:
win_pushdo_auto
SH256 hash:
b20984771f38828a83e820177f49ed9bd3c1f7d4e0074c3e98fea8e9b2aee59f
MD5 hash:
b9157cd95bfaaaf53a58039b26630cd2
SHA1 hash:
c36591601e8edc0bd9ddf91c496262d354210601
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Cutwail

Executable exe b20984771f38828a83e820177f49ed9bd3c1f7d4e0074c3e98fea8e9b2aee59f

(this sample)

  
Delivery method
Distributed via web download

Comments