MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b645ab8a1b64fc9f188c488cddd72969f708e673b2b557ed65d87a0278753378. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: b645ab8a1b64fc9f188c488cddd72969f708e673b2b557ed65d87a0278753378
SHA3-384 hash: 11100d913256ef337a25f9d2166ac0df3821ed8a09323735b74d32d884d5d17c8af97952b95129481889667c46b495d2
SHA1 hash: a0130a504e4b99e2f833645f5d39f489171c7e9b
MD5 hash: 2b62105cfdc8560dca612cfc5f86780d
humanhash: solar-bravo-sweet-march
File name:2b62105cfdc8560dca612cfc5f86780d.exe
Download: download sample
File size:1'199'616 bytes
First seen:2023-01-03 17:18:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b9246a6f0590807e911f84af26b683e4 (7 x Smoke Loader, 3 x RedLineStealer, 1 x Amadey)
ssdeep 24576:yqcTVJEIrtvv+HyCMK88MMHONTS43nxQgTtN:rm3GMKTHv43C
Threatray 75 similar samples on MalwareBazaar
TLSH T1B345123077A0A036FA2F09794D29DBE05D69BD335BA0698F3358769F5B702E0853ED84
TrID 37.3% (.EXE) Win64 Executable (generic) (10523/12/4)
17.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
16.0% (.EXE) Win32 Executable (generic) (4505/5/1)
7.3% (.ICL) Windows Icons Library (generic) (2059/9)
7.2% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon fcfcb4b4b4949cc0 (6 x Smoke Loader, 2 x Tofsee, 2 x CoinMiner)
Reporter atomiczsec
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
195
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2b62105cfdc8560dca612cfc5f86780d.exe
Verdict:
Malicious activity
Analysis date:
2023-01-03 17:24:01 UTC
Tags:
stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Launching a process
Creating a process with a hidden window
Creating a window
Launching the default Windows debugger (dwwin.exe)
Verdict:
No Threat
Threat level:
  2/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
84 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2023-01-03 17:19:07 UTC
File Type:
PE (Exe)
Extracted files:
86
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
collection discovery persistence spyware stealer
Behaviour
Checks processor information in registry
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Accesses Microsoft Outlook profiles
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Sets DLL path for service in the registry
Sets service image path in registry
Unpacked files
SH256 hash:
9c6d8b05a111c15b2a7cd9de3b88aa54f496da6ad5c71e4b131067a9dad32da7
MD5 hash:
14a3a4efca5e44c0138db669f469c181
SHA1 hash:
c78cdabb29b2fbe7d101e7e128a764c77d9e6191
SH256 hash:
6bcd95f201895695b22dcec82f54e88d7bcae7b69dc670bf80b97c5eb84fedf0
MD5 hash:
976b8fd0cc5dfc65407cd9e4bd2b43bf
SHA1 hash:
ac42cb6870b8c257622edb87c8ea323e16ecfbe9
SH256 hash:
b645ab8a1b64fc9f188c488cddd72969f708e673b2b557ed65d87a0278753378
MD5 hash:
2b62105cfdc8560dca612cfc5f86780d
SHA1 hash:
a0130a504e4b99e2f833645f5d39f489171c7e9b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments