MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b8dd4a784dda6eba1e23db2b1a8efe64c213136ea8d92680324af4bb2035416e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 13


Intelligence 13 IOCs YARA 17 File information Comments

SHA256 hash: b8dd4a784dda6eba1e23db2b1a8efe64c213136ea8d92680324af4bb2035416e
SHA3-384 hash: fb3efe5aa8d9c35db8392f5bd76fc021fb19320109fdb2b3de1dece9149c0265728a98d95d0f22e004496d833cdc6760
SHA1 hash: 918c2e7da8a6c5c6dd57eb96899650fafb693e1e
MD5 hash: 9651ede72bae625a1acf243c43e46c15
humanhash: berlin-seventeen-lithium-august
File name:BraveCrashHandler.exe
Download: download sample
File size:1'265'152 bytes
First seen:2023-12-10 11:20:37 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5e5ac8ab7be27ac2d1c548e5589378b6 (11 x GuLoader, 6 x Stealc, 5 x RedLineStealer)
ssdeep 24576:RPb4jQUDvbnJ+CB0cC7crkA/Pj/aJrU76tO4EYGI8CpIiGVbRbqU9h4W4diN/U:J+vACa0kkzanOTYGI8C+vVbR2UHaGM
TLSH T17B453362DB1C2CA1DBF28F374A774EAE4B95BCEC9615974E6E10000A391227C44777EE
TrID 34.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
23.4% (.EXE) Win32 Executable (generic) (4505/5/1)
10.7% (.EXE) Win16/32 Executable Delphi generic (2072/23)
10.5% (.EXE) OS/2 Executable (generic) (2029/13)
10.4% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter Xev
Tags:Downloader exe


Avatar
NIXLovesCooper
https://files.goriem.com/BraveCrashHandler.exe
https://ewr1.vultrobjects.com/535e553e/BraveCrashHandler.exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
340
Origin country :
GR GR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Searching for analyzing tools
Creating a file in the %temp% directory
Enabling the 'hidden' option for files in the %temp% directory
Running batch commands
Creating a process with a hidden window
Launching a process
Using the Windows Management Instrumentation requests
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Enabling the 'hidden' option for recently created files
Creating a file in the %AppData% directory
Adding an exclusion to Microsoft Defender
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
enigma lolbin obfuscated packed packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Drops PE files to the user root directory
Encrypted powershell cmdline option found
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Potential dropper URLs found in powershell memory
Powershell drops PE file
Tries to detect sandboxes and other dynamic analysis tools (window names)
Uses whoami command line tool to query computer and username
Very long command line found
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1357269 Sample: BraveCrashHandler.exe Startdate: 10/12/2023 Architecture: WINDOWS Score: 100 57 Multi AV Scanner detection for domain / URL 2->57 59 Antivirus detection for URL or domain 2->59 61 Multi AV Scanner detection for dropped file 2->61 63 4 other signatures 2->63 8 BraveCrashHandler.exe 1 2->8         started        process3 signatures4 65 Detected unpacking (changes PE section rights) 8->65 67 Tries to detect sandboxes and other dynamic analysis tools (window names) 8->67 69 Hides threads from debuggers 8->69 11 cmd.exe 1 8->11         started        process5 signatures6 71 Very long command line found 11->71 73 Encrypted powershell cmdline option found 11->73 14 powershell.exe 2 33 11->14         started        17 powershell.exe 15 25 11->17         started        21 powershell.exe 24 11->21         started        23 13 other processes 11->23 process7 dnsIp8 75 Drops PE files to the user root directory 14->75 77 Potential dropper URLs found in powershell memory 14->77 79 Uses whoami command line tool to query computer and username 14->79 81 Powershell drops PE file 14->81 25 whoami.exe 1 14->25         started        27 chcp.com 1 14->27         started        53 108.61.0.122 AS-CHOOPAUS United States 17->53 55 149.28.239.184 AS-CHOOPAUS United States 17->55 41 C:\ProgramData\BraveCrashHandler.exe, PE32 17->41 dropped 29 chcp.com 1 17->29         started        43 C:\Users\user\...behaviorgraphoogleCrashHandler64.exe, PE32 21->43 dropped 31 chcp.com 21->31         started        45 C:\Users\usermbmake.exe, PE32 23->45 dropped 47 C:\Users\usermbedit.exe, PE32 23->47 dropped 49 C:\Users\user\...behaviorgraphoogleCrashHandler.exe, PE32 23->49 dropped 51 C:\Users\user\...\BraveCrashHandler64.exe, PE32 23->51 dropped 33 chcp.com 1 23->33         started        35 chcp.com 23->35         started        37 chcp.com 23->37         started        39 9 other processes 23->39 file9 signatures10 process11
Threat name:
Win32.Trojan.Malgent
Status:
Malicious
First seen:
2023-12-10 04:36:45 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
19 of 23 (82.61%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion persistence ransomware trojan
Behaviour
Interacts with shadow copies
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
Blocklisted process makes network request
Disables RegEdit via registry modification
Downloads MZ/PE file
Deletes shadow copies
UAC bypass
Unpacked files
SH256 hash:
71fd25496170732ebde862ccb23f10f8fcc80686c502de43152926348f1262a0
MD5 hash:
bb621b55025bd94e754ee117e877fc2d
SHA1 hash:
18c54c7c3cff4b4936c9a3236c29c22bba02783e
SH256 hash:
b8dd4a784dda6eba1e23db2b1a8efe64c213136ea8d92680324af4bb2035416e
MD5 hash:
9651ede72bae625a1acf243c43e46c15
SHA1 hash:
918c2e7da8a6c5c6dd57eb96899650fafb693e1e
Detections:
SUSP_XORed_URL_In_EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:EnigmaStub
Author:@bartblaze
Description:Identifies Enigma packer stub.
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:RC6_Constants
Author:chort (@chort0)
Description:Look for RC6 magic constants in binary
Reference:https://twitter.com/mikko/status/417620511397400576
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:SUSP_XORed_URL_In_EXE
Author:Florian Roth (Nextron Systems)
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834
Rule name:SUSP_XORed_URL_in_EXE_RID2E46
Author:Florian Roth
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe b8dd4a784dda6eba1e23db2b1a8efe64c213136ea8d92680324af4bb2035416e

(this sample)

Comments