MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b3c03dc87f759a1b0336cb34993bed8d35f9b4e5b28295ff57ebb968875d14e9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: b3c03dc87f759a1b0336cb34993bed8d35f9b4e5b28295ff57ebb968875d14e9
SHA3-384 hash: ea11c17d81641e02db3223a1f932b050e3eed2f205fe41cb8de921bbea36492c9742e5269a6d4e7d9174cceb59815939
SHA1 hash: 0a6fadbd97a795bf2e2de2d8f179b8f1f9e64c3a
MD5 hash: 18cb228ab33391b317543a8081801f01
humanhash: august-arizona-sink-florida
File name:0a6fadbd97a795bf2e2de2d8f179b8f1f9e64c3a
Download: download sample
File size:94'720 bytes
First seen:2022-03-15 23:35:45 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2c5f2513605e48f2d8ea5440a870cb9e (60 x Babadeda, 6 x AveMariaRAT, 5 x CoinMiner)
ssdeep 1536:T7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfiwZnDOf:P7DhdC6kzWypvaQ0FxyNTBfiec
Threatray 142 similar samples on MalwareBazaar
TLSH T1D1937D41F3E202F7EAF1093100A6726FD73662389764E8DBC74C2D529913AD5A63D3E9
Reporter vxunderground
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
265
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0a6fadbd97a795bf2e2de2d8f179b8f1f9e64c3a
Verdict:
No threats detected
Analysis date:
2022-03-16 01:47:32 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Running batch commands
Launching a process
Creating a file
Creating a process from a recently created file
Creating a window
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Babadeda
Detection:
malicious
Classification:
troj.evad
Score:
84 / 100
Signature
Adds a directory exclusion to Windows Defender
Command shell drops VBS files
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Powershell adding suspicious path to exclusion list
Sigma detected: Powershell Used To Disable Windows Defender AV Security Monitoring
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WannaCry Ransomware
Sigma detected: WScript or CScript Dropper
Tries to download files via bitsadmin
Uses bcdedit to modify the Windows boot settings
Yara detected Babadeda
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 590051 Sample: bltUimKyby Startdate: 16/03/2022 Architecture: WINDOWS Score: 84 28 Multi AV Scanner detection for domain / URL 2->28 30 Sigma detected: WannaCry Ransomware 2->30 32 Sigma detected: Powershell adding suspicious path to exclusion list 2->32 34 6 other signatures 2->34 7 bltUimKyby.exe 8 2->7         started        process3 file4 24 C:\Users\user\AppData\Local\Temp\...\32DE.bat, ASCII 7->24 dropped 10 cmd.exe 2 7->10         started        14 conhost.exe 7->14         started        process5 file6 26 C:\Users\user\AppData\Local\Temp\tmp.vbs, ASCII 10->26 dropped 36 Tries to download files via bitsadmin 10->36 38 Command shell drops VBS files 10->38 40 Uses bcdedit to modify the Windows boot settings 10->40 42 Adds a directory exclusion to Windows Defender 10->42 16 powershell.exe 22 10->16         started        18 wscript.exe 10->18         started        20 NSudo.exe 10->20         started        22 16 other processes 10->22 signatures7 process8
Threat name:
Win32.Ransomware.LockBit
Status:
Malicious
First seen:
2022-03-14 03:02:31 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
23 of 42 (54.76%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion trojan
Behaviour
Download via BitsAdmin
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Legitimate hosting services abused for malware hosting/C2
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
UAC bypass
Unpacked files
SH256 hash:
b3c03dc87f759a1b0336cb34993bed8d35f9b4e5b28295ff57ebb968875d14e9
MD5 hash:
18cb228ab33391b317543a8081801f01
SHA1 hash:
0a6fadbd97a795bf2e2de2d8f179b8f1f9e64c3a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments