MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b444f740cfdcc089b5b5e6a4a6ab13830d7a1ae68def76a2b01242c701f5428e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: b444f740cfdcc089b5b5e6a4a6ab13830d7a1ae68def76a2b01242c701f5428e
SHA3-384 hash: b9481ee4ffdd4cb2347fbdd10d0e9e973e4b3db5fdb64e7aed786943b82a191fbdef42b87c2b7401e2a289219c45910d
SHA1 hash: b63882c1f439aba614e06129cfc2ebaed980cdc0
MD5 hash: b612a406ba18ce71bd8af823fddc3692
humanhash: butter-three-eleven-carbon
File name:b612a406ba18ce71bd8af823fddc3692.dll
Download: download sample
File size:106'196 bytes
First seen:2022-02-09 16:45:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 768:J8l0ZHiVK52jxcVfvenMMvR5GgBdcbWePQ5+PSiQaHqh/Y1+0xefzlYvaFtzOAjI:8eHTu/nMZoHrrxRi9VZunBAx61h42c9
Threatray 19 similar samples on MalwareBazaar
TLSH T1BFA3B66F9135465BEEDA4C74DC8C63A6CA936E3C4E37DAF61C64D0703828165BA2B313
Reporter abuse_ch
Tags:dll exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
177
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
DNS request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Call by Ordinal
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 569540 Sample: 5jEM8baF64.dll Startdate: 09/02/2022 Architecture: WINDOWS Score: 52 13 Multi AV Scanner detection for submitted file 2->13 15 Sigma detected: Suspicious Call by Ordinal 2->15 7 loaddll64.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        process5 11 rundll32.exe 9->11         started       
Result
Malware family:
n/a
Score:
  4/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Drops file in Windows directory
Unpacked files
SH256 hash:
b444f740cfdcc089b5b5e6a4a6ab13830d7a1ae68def76a2b01242c701f5428e
MD5 hash:
b612a406ba18ce71bd8af823fddc3692
SHA1 hash:
b63882c1f439aba614e06129cfc2ebaed980cdc0
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe b444f740cfdcc089b5b5e6a4a6ab13830d7a1ae68def76a2b01242c701f5428e

(this sample)

  
Delivery method
Distributed via web download

Comments