MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b7c78e8480d002889a9c135f046d072ea256893285f7788644ec4a741019850b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: b7c78e8480d002889a9c135f046d072ea256893285f7788644ec4a741019850b
SHA3-384 hash: 176f0b622b089593e87fd2b7dee88a2825e4317b354831f0d0664cd533997d3ad8d934d416c83374cc8c59989bf622b5
SHA1 hash: ba512622a7236dd13d3e3d7858b36e400116c52b
MD5 hash: 573bcd759e341e5abc3d4980b9d0434d
humanhash: nuts-artist-seventeen-bakerloo
File name:ad3be8bfe42414dbefd5a70b62730780
Download: download sample
File size:27'136 bytes
First seen:2020-11-17 16:00:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 87bed5a7cba00c7e1f4015f1bdae2183 (3'034 x Jadtre, 23 x IcedID, 17 x Blackmoon)
ssdeep 768:Kd5u7mNGtyVfjUDsQGPL4vzZq2o9W7Gtxt3YV:Kd5z/fjgvGCq2iW7Y
Threatray 1'575 similar samples on MalwareBazaar
TLSH A3C2D073CE8084FFC0CB3032204522CB9B575A72A56A6867A750D81E7DBCDD0DA7A753
Reporter seifreed

Intelligence


File Origin
# of uploads :
1
# of downloads :
61
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a window
Changing an executable file
DNS request
Connection attempt
Sending an HTTP POST request
Modifying an executable file
Creating a file
Running batch commands
Creating a process with a hidden window
Connection attempt to an infection source
Infecting executable files
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
spre.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Wapomi
Behaviour
Behavior Graph:
Threat name:
Win32.Virus.Wapomi
Status:
Malicious
First seen:
2020-11-17 16:08:06 UTC
AV detection:
26 of 28 (92.86%)
Threat level:
  5/5
Unpacked files
SH256 hash:
b7c78e8480d002889a9c135f046d072ea256893285f7788644ec4a741019850b
MD5 hash:
573bcd759e341e5abc3d4980b9d0434d
SHA1 hash:
ba512622a7236dd13d3e3d7858b36e400116c52b
SH256 hash:
3721151e23704b27e34bef8d3c5f589e69b396a62052d9cbf03425f0209be80c
MD5 hash:
1736d786b1a740f1ba4508a6e057e057
SHA1 hash:
90888014e24d582015ef51d3f38f212a3c4c88ce
Detections:
win_unidentified_045_g0 win_unidentified_045_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments