MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b7c6a4f61402affbef93c0f070c06d1169921039c675a642e9a56ca04b99db4d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



WhiteSnakeStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 4 File information Comments 1

SHA256 hash: b7c6a4f61402affbef93c0f070c06d1169921039c675a642e9a56ca04b99db4d
SHA3-384 hash: d9d83805b23bb818cd3ce3e6c072b67f00881b5124063f6705f5716b76dad62715f1d63e80831b3140cd9e6cfc325bcc
SHA1 hash: 69941b87fef9335adc29da906b0b58e88ef5a528
MD5 hash: 88c5868c1384d86f9ee36d893ac66bb6
humanhash: idaho-magnesium-maryland-shade
File name:88c5868c1384d86f9ee36d893ac66bb6
Download: download sample
Signature WhiteSnakeStealer
File size:625'823 bytes
First seen:2023-09-08 04:50:01 UTC
Last seen:2023-10-01 08:55:57 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash fa8d20faea9ef7b4e2b7fbfe93442593 (17 x RedLineStealer, 4 x CoinMiner, 3 x AgentTesla)
ssdeep 12288:V9cOGOiD/34hk8PxrtRoAt6fD/JWpG1BBwFpfVHJj:DcbD/3SkGRtRPqD/xYpfHj
Threatray 61 similar samples on MalwareBazaar
TLSH T114D4DF217580F471E4AA943419D3B26277697F301BB04ADB934B3E3D4A741E0AAFBD72
TrID 40.3% (.EXE) Win64 Executable (generic) (10523/12/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4505/5/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon 6cccd4e0f0d0c4d4 (8 x Loki, 3 x NanoCore, 2 x WhiteSnakeStealer)
Reporter zbetcheckin
Tags:32 77-91-68-78 exe WhiteSnakeStealer

Intelligence


File Origin
# of uploads :
3
# of downloads :
292
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
88c5868c1384d86f9ee36d893ac66bb6
Verdict:
Malicious activity
Analysis date:
2023-09-08 04:51:07 UTC
Tags:
evasion whitesnake stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Using the Windows Management Instrumentation requests
Creating a file
Sending a custom TCP request
Running batch commands
Creating a process with a hidden window
Launching a process
Reading critical registry keys
Launching the process to change network settings
DNS request
Sending an HTTP GET request
Unauthorized injection to a recently created process
Stealing user critical data
Enabling autorun by creating a file
Gathering data
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Gurcu Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Capture Wi-Fi password
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Uses ping.exe to check the status of other devices and networks
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
Yara detected Gurcu Stealer
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1305908 Sample: FUN3iwvcxo.exe Startdate: 08/09/2023 Architecture: WINDOWS Score: 100 93 Found malware configuration 2->93 95 Antivirus detection for URL or domain 2->95 97 Sigma detected: Capture Wi-Fi password 2->97 99 5 other signatures 2->99 10 FUN3iwvcxo.exe 10 2->10         started        13 RF6tg7YH.exe 2->13         started        process3 dnsIp4 77 C:\Users\user\AppData\Local\...\RF6tg7YH.exe, PE32 10->77 dropped 17 RF6tg7YH.exe 6 10->17         started        87 api.telegram.org 149.154.167.220, 443, 49709, 49720 TELEGRAMRU United Kingdom 13->87 89 140.82.113.4, 443, 49707 GITHUBUS United States 13->89 91 3 other IPs or domains 13->91 127 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 13->127 129 Tries to steal Mail credentials (via file / registry access) 13->129 131 Tries to harvest and steal browser information (history, passwords, etc) 13->131 133 Tries to harvest and steal WLAN passwords 13->133 21 cmd.exe 13->21         started        23 cmd.exe 13->23         started        file5 signatures6 process7 file8 75 C:\Users\user\AppData\Local\...\RF6tg7YH.exe, PE32 17->75 dropped 101 Antivirus detection for dropped file 17->101 103 Machine Learning detection for dropped file 17->103 105 Found many strings related to Crypto-Wallets (likely being stolen) 17->105 25 cmd.exe 1 17->25         started        107 Tries to harvest and steal WLAN passwords 21->107 28 conhost.exe 21->28         started        30 chcp.com 21->30         started        32 netsh.exe 21->32         started        34 findstr.exe 21->34         started        36 conhost.exe 23->36         started        38 chcp.com 23->38         started        40 netsh.exe 23->40         started        42 findstr.exe 23->42         started        signatures9 process10 signatures11 111 Uses schtasks.exe or at.exe to add and modify task schedules 25->111 113 Uses ping.exe to check the status of other devices and networks 25->113 115 Uses netsh to modify the Windows network and firewall settings 25->115 117 Tries to harvest and steal WLAN passwords 25->117 44 RF6tg7YH.exe 14 6 25->44         started        48 PING.EXE 1 25->48         started        50 conhost.exe 25->50         started        52 2 other processes 25->52 process12 dnsIp13 79 ip-api.com 208.95.112.1, 49705, 49708, 80 TUT-ASUS United States 44->79 81 51.77.200.232, 49706, 49710, 8080 OVHFR France 44->81 85 6 other IPs or domains 44->85 119 Antivirus detection for dropped file 44->119 121 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 44->121 123 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 44->123 125 5 other signatures 44->125 54 cmd.exe 1 44->54         started        57 cmd.exe 44->57         started        83 127.0.0.1 unknown unknown 48->83 signatures14 process15 signatures16 109 Tries to harvest and steal WLAN passwords 54->109 59 netsh.exe 3 54->59         started        61 conhost.exe 54->61         started        63 chcp.com 1 54->63         started        65 findstr.exe 54->65         started        67 conhost.exe 57->67         started        69 chcp.com 57->69         started        71 netsh.exe 57->71         started        73 findstr.exe 57->73         started        process17
Threat name:
Win32.Spyware.Whitesnake
Status:
Malicious
First seen:
2023-09-08 04:51:05 UTC
File Type:
PE (Exe)
Extracted files:
8
AV detection:
19 of 24 (79.17%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
collection discovery spyware stealer
Behaviour
Creates scheduled task(s)
Modifies system certificate store
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Accesses Microsoft Outlook profiles
Checks installed software on the system
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
c6cd72262e19ad21011de050a0435ea8b408eece96e320011b7e9edee31a9715
MD5 hash:
af0bbb9b70c6ae95bbbb977813da143f
SHA1 hash:
f303fcc6e2aba9a9bac3b5e990cd7a2513cfb3d2
SH256 hash:
b7c6a4f61402affbef93c0f070c06d1169921039c675a642e9a56ca04b99db4d
MD5 hash:
88c5868c1384d86f9ee36d893ac66bb6
SHA1 hash:
69941b87fef9335adc29da906b0b58e88ef5a528
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

WhiteSnakeStealer

Executable exe b7c6a4f61402affbef93c0f070c06d1169921039c675a642e9a56ca04b99db4d

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-09-08 04:50:03 UTC

url : hxxp://77.91.68.78/lend/windowsystem.exe