MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b35829664c382f60985dd528fa9215976becb2babb0978fc3d24649ca5f94eae. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Stop


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: b35829664c382f60985dd528fa9215976becb2babb0978fc3d24649ca5f94eae
SHA3-384 hash: 01b8f649c572769a8dfb617a1a8c3e519ed83adb84ff72c3534c97b2d759cc97f1c2d3f2c8ce64b10c938256cd7bc0dd
SHA1 hash: 7b66d7358b68535d64cd10c0685ee1d9c9142af8
MD5 hash: 40004d64f4e22c27497ac8242c332be3
humanhash: november-spring-river-high
File name:b35829664c382f60985dd528fa9215976becb2babb0978fc3d24649ca5f94eae
Download: download sample
Signature Stop
File size:769'536 bytes
First seen:2020-06-12 08:11:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d247bf99df53a512a7e2699267a87ed8 (1 x Stop)
ssdeep 12288:z+yTD98gkFNJ3eVvfDOQ7v+gOjtK6af7UqKUyiAvKKFw8yUkn/CeWAaU64uiyIaA:8n3eV6Q7v+gc7af7kUyLiKFwmknhaJIJ
Threatray 24 similar samples on MalwareBazaar
TLSH F1F4121632D1C4B2E8A706324958DE714A3DFD614FB0CD833B88575F6EF81E0AA66772
Reporter JAMESWT_WT
Tags:Ransomware Stop

Intelligence


File Origin
# of uploads :
1
# of downloads :
169
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.DanaBot
Status:
Malicious
First seen:
2020-06-11 19:39:22 UTC
File Type:
PE (Exe)
Extracted files:
26
AV detection:
42 of 48 (87.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery persistence
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Adds Run key to start application
Looks up external IP address via web service
Modifies file permissions
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_stop_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments