MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 b40b78fc2ad18f2fed2fac1b32447003d407ecfb46d15ef62bb483fbd5a482d8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 3
| SHA256 hash: | b40b78fc2ad18f2fed2fac1b32447003d407ecfb46d15ef62bb483fbd5a482d8 |
|---|---|
| SHA3-384 hash: | fe10ca4affa08c871e753f2e83d6de886c292466df7c9a2a2666d049339ae962a9323680066379318a6878e48e8ee9b2 |
| SHA1 hash: | 2c512dae4d5a408f5fd546a7d230b1207ac6f00d |
| MD5 hash: | 743f97b945eec9b805d7efb88010dd71 |
| humanhash: | hydrogen-kentucky-xray-social |
| File name: | 743f97b945eec9b805d7efb88010dd71 |
| Download: | download sample |
| File size: | 212'992 bytes |
| First seen: | 2020-11-17 11:44:41 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 03ae0108c7455c49c94d2d60afa1e57a (1 x Worm.Ramnit) |
| ssdeep | 3072:sCosI7JYEbJBf6TYDKvJe+EWghJRoS24yX8K7GIC8DOKpmo/dvM4pLthEjQT6j:esIdYdYDKvJenQZL82eKp9/d0kEj1 |
| Threatray | 132 similar samples on MalwareBazaar |
| TLSH | 30247C40BEE4C857F2972A7848F2C3E506BBBC21A7F5D31B278D371DAD706198E49261 |
| Reporter |
Intelligence
File Origin
# of uploads :
1
# of downloads :
55
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Behaviour
Sending a UDP request
Creating a window
Creating a file in the Windows directory
Running batch commands
Creating a process with a hidden window
Creating a process from a recently created file
Launching the default Windows debugger (dwwin.exe)
Creating a file in the Windows subdirectories
Threat name:
Win32.Trojan.Aenjaris
Status:
Malicious
First seen:
2020-10-04 08:18:08 UTC
AV detection:
28 of 29 (96.55%)
Threat level:
5/5
Verdict:
unknown
Similar samples:
+ 122 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Program crash
Drops file in Windows directory
Drops file in System32 directory
Loads dropped DLL
Executes dropped EXE
ServiceHost packer
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
b40b78fc2ad18f2fed2fac1b32447003d407ecfb46d15ef62bb483fbd5a482d8
MD5 hash:
743f97b945eec9b805d7efb88010dd71
SHA1 hash:
2c512dae4d5a408f5fd546a7d230b1207ac6f00d
SH256 hash:
9afae0514738c9dec4900b7276217a4d351928d84eb3cbfc66feb9bdfffea853
MD5 hash:
4f8b4a7cd1e62b7f6a47ffc03fe1af1c
SHA1 hash:
6aa2c65dfa564acb8b8db1c633fe7f697d8ba29c
SH256 hash:
40bec437295b9d6b18caf506b9b080bd040c0b2c4bf6b72e768153eb0d2e7fd2
MD5 hash:
72c7a67e5655181570c34d060f6584aa
SHA1 hash:
719c9b6f5ef1f567fd55c2f2f5b3d085c0cd467c
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Delivery method
Other
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.