MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b2f43a3821b25e1dae64b151314963fe4e3319c91f20c590198869f49b380446. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: b2f43a3821b25e1dae64b151314963fe4e3319c91f20c590198869f49b380446
SHA3-384 hash: 76ca0a5af629b50071439cec457021675aaf2129407f2701095d48977c7b5e7802fb204fea93e647ebf7b505ebfddc1e
SHA1 hash: a67c3db14d7302f35c1ad849e2b04bdcac142437
MD5 hash: a9844c22d577c7c6f84442284c6c892b
humanhash: mountain-south-sink-victor
File name:file
Download: download sample
File size:4'510'208 bytes
First seen:2023-02-19 12:34:09 UTC
Last seen:2023-02-19 14:27:31 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9aebf3da4677af9275c461261e5abde3 (25 x YTStealer, 12 x CobaltStrike, 11 x Hive)
ssdeep 98304:FtHUiWQY1p79oNW+1Fz0ml6nZRsjtfpnGsrJQC7xoD:FthWQ2p79aJj0mMnIjtvD7K
Threatray 290 similar samples on MalwareBazaar
TLSH T11E26330D2A9C7806E067DD34654B36D4EC99C0F6AF67B996CC8EE47BBD88C640B106DC
TrID 63.5% (.EXE) UPX compressed Win64 Executable (70117/5/12)
24.5% (.EXE) UPX compressed Win32 Executable (27066/9/6)
4.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.8% (.ICL) Windows Icons Library (generic) (2059/9)
1.8% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter andretavare5
Tags:exe


Avatar
andretavare5
Sample downloaded from https://vk.com/doc10773776_659757868?hash=VDpHuHL8RrPKJClXRNjZ33MzNrnSe313di7os8LCPiP&dl=GEYDONZTG43TM:1676806395:aiyeE0UIztbyeu13vNbqJ9qnNt8wsFZRZmmDNEarGjz&api=1&no_preview=1#erg10

Intelligence


File Origin
# of uploads :
7
# of downloads :
236
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-02-19 12:37:49 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Reading critical registry keys
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw
Score:
60 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Behaviour
Behavior Graph:
Threat name:
Win64.Infostealer.Goback
Status:
Malicious
First seen:
2023-02-19 12:35:11 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
15 of 25 (60.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
spyware stealer upx
Behaviour
Reads user/profile data of web browsers
UPX packed file
Unpacked files
SH256 hash:
975d8189dc508a459090f0e065b7d70892785f0cf49e02ff7cf1c7350994b600
MD5 hash:
c8245a6afc526e20bb0ad2366fc27cc3
SHA1 hash:
d8f103338290124e1b6262b83f433768c2c9030d
SH256 hash:
b2f43a3821b25e1dae64b151314963fe4e3319c91f20c590198869f49b380446
MD5 hash:
a9844c22d577c7c6f84442284c6c892b
SHA1 hash:
a67c3db14d7302f35c1ad849e2b04bdcac142437
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments