MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ba4445419d534dd16aa0e5af096d451b81638173c80686d5aa8816b780514396. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA 3 File information Comments 1

SHA256 hash: ba4445419d534dd16aa0e5af096d451b81638173c80686d5aa8816b780514396
SHA3-384 hash: 9fd40e683b5ad325992e694277b4e0a0d9531c6ce39f68f7d365ea08e81fc3f8228c6c8b5db8a149d3982bee9168c893
SHA1 hash: a64fd9f126ef259503422589754cee13b20de080
MD5 hash: 4e88cb52fa6c33f10aeeac975b2e4cd4
humanhash: oscar-robert-mississippi-may
File name:4e88cb52fa6c33f10aeeac975b2e4cd4
Download: download sample
File size:1'409'528 bytes
First seen:2023-11-27 18:16:42 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash c3808a9e82ae47a53120a4e9320a8c72
ssdeep 24576:ZcOeh7E7IJbtEJEHng8wGrQTLq73xaH7pbHl6GV:ZcOWFJbtSMXoTLq73xK51
Threatray 73 similar samples on MalwareBazaar
TLSH T18D656B12F4FFE81FC8362031C85DA046FB9B299251B73EC8693D6C2994776B57992C0B
TrID 38.7% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
24.6% (.EXE) Win64 Executable (generic) (10523/12/4)
11.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.5% (.EXE) Win32 Executable (generic) (4505/5/1)
4.7% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon ccccc4e8d89acccc (1 x CobaltStrike, 1 x Gh0stRAT, 1 x ValleyRAT)
Reporter zbetcheckin
Tags:32 dll exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
337
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1348817 Sample: XSveuOAaXN.dll Startdate: 27/11/2023 Architecture: WINDOWS Score: 48 19 Multi AV Scanner detection for submitted file 2->19 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        13 rundll32.exe 7->13         started        15 36 other processes 7->15 process5 17 rundll32.exe 9->17         started       
Threat name:
Win32.Backdoor.Farfli
Status:
Malicious
First seen:
2023-11-27 18:17:06 UTC
File Type:
PE (Dll)
Extracted files:
38
AV detection:
15 of 37 (40.54%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
ba4445419d534dd16aa0e5af096d451b81638173c80686d5aa8816b780514396
MD5 hash:
4e88cb52fa6c33f10aeeac975b2e4cd4
SHA1 hash:
a64fd9f126ef259503422589754cee13b20de080
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Armadillov1xxv2xx
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DLL dll ba4445419d534dd16aa0e5af096d451b81638173c80686d5aa8816b780514396

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-11-27 18:16:43 UTC

url : hxxp://118.107.7.250:4159/ndldll.txt