MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b31922461be215289c3801f6d2f6c2ad14edd8e8ef648a274b37121d7dd155ea. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: b31922461be215289c3801f6d2f6c2ad14edd8e8ef648a274b37121d7dd155ea
SHA3-384 hash: 55e3e79778ec4e5482b65085315738841e5f1f0aa27d3f65e61d27e7bed39727fb692dbfbcb689dac7aded774aa302c6
SHA1 hash: 06d004c5c20ea27a5d8328eb8d4f5955a79ddd3d
MD5 hash: 10f3636bc00a4e508e27c4e52bd8b8df
humanhash: artist-blue-violet-hydrogen
File name:QwikMark.exe
Download: download sample
File size:909'312 bytes
First seen:2021-01-14 12:11:15 UTC
Last seen:2021-01-14 13:48:02 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash bab19b5b2eb392cf84305a334336a5fd
ssdeep 24576:bD8eEHAD8qk5WhehTUk7q7d31P17KTo9:bLEg65WhehTr7q7dlP17KTo9
Threatray 3 similar samples on MalwareBazaar
TLSH 3A15330135C11971DC89637C1DC5371C7FBC2233E3A47ABAADACAFE6B613991006499B
Reporter JAMESWT_WT

Intelligence


File Origin
# of uploads :
2
# of downloads :
129
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
98c261fc578802232657c1bec8befeff60ec897a1aebfd87f0658b9d694bf7f5.exe
Verdict:
Malicious activity
Analysis date:
2021-01-14 13:28:00 UTC
Tags:
trojan adware

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Sending a UDP request
Sending a TCP request to an infection source
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
68 / 100
Signature
Contains functionality to infect the boot sector
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.BestaFera
Status:
Malicious
First seen:
2021-01-14 12:11:22 UTC
File Type:
PE (Exe)
AV detection:
19 of 29 (65.52%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
bootkit persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Writes to the Master Boot Record (MBR)
Unpacked files
SH256 hash:
b31922461be215289c3801f6d2f6c2ad14edd8e8ef648a274b37121d7dd155ea
MD5 hash:
10f3636bc00a4e508e27c4e52bd8b8df
SHA1 hash:
06d004c5c20ea27a5d8328eb8d4f5955a79ddd3d
SH256 hash:
8964cc6e96651030f19e232b3e7b9c7ea54a16bbc72edd5eaa9ac42ec577ba10
MD5 hash:
d6ac4a8f87d795d0d53ea53558927842
SHA1 hash:
d147d52994863220e805f7deb037c456c97cb531
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments