MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 b3ad13f776f60df12ef17cf20772f823a78941ba1d7ccd7e32d290ac7b3f9e7a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stop
Vendor detections: 13
| SHA256 hash: | b3ad13f776f60df12ef17cf20772f823a78941ba1d7ccd7e32d290ac7b3f9e7a |
|---|---|
| SHA3-384 hash: | bb21201281b801883f25638c86c05f610d58da914c0e7f5ab5671b8640bafb758c95ae64e45d2c9cdef3a3cf9469bcf2 |
| SHA1 hash: | aac532018ca8c9f9d6f34de4e82f9f45d00ca8f5 |
| MD5 hash: | 1722ac41d4716258e295807cda56d9bd |
| humanhash: | massachusetts-zulu-april-london |
| File name: | b3ad13f776f60df12ef17cf20772f823a78941ba1d7ccd7e32d290ac7b3f9e7a |
| Download: | download sample |
| Signature | Stop |
| File size: | 799'744 bytes |
| First seen: | 2021-09-03 09:05:43 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 7bb5fa0b8cc629bb852d76174c2fb878 (4 x Smoke Loader, 2 x ArkeiStealer, 1 x RaccoonStealer) |
| ssdeep | 24576:8iIXTR4IDHqbannC1+RTJJvJnDm0JwO3NP/B:kBDIannCQR9Jhn1J7nB |
| Threatray | 467 similar samples on MalwareBazaar |
| TLSH | T140050121B6C1C835F7B712F445B9927D642CB9716F6850CB62C636FE6A342E89C3036B |
| dhash icon | d824e790c4e72158 (30 x RaccoonStealer, 18 x RedLineStealer, 16 x Smoke Loader) |
| Reporter | |
| Tags: | exe Stop |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | MALWARE_Win_STOP |
|---|---|
| Author: | ditekSHen |
| Description: | Detects STOP ransomware |
| Rule name: | SUSP_XORed_URL_in_EXE |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.