MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 baecc747370a4c396ef5403a3a2b286465d8fe4677bf1bfd23b8164ef5c22bbb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA 23 File information Comments

SHA256 hash: baecc747370a4c396ef5403a3a2b286465d8fe4677bf1bfd23b8164ef5c22bbb
SHA3-384 hash: 2c43e343b6f4cfd65fc36f4d1f0140c304c3f7dc079b9fc2428f72616c194944a0ac912523ce13da4d096a836b6fcd45
SHA1 hash: f935c3d6f9601c795f2211e34b3778fad14442b4
MD5 hash: a48e3197ab0f64c4684f0828f742165c
humanhash: north-romeo-comet-indigo
File name:SecuriteInfo.com.Variant.Application.Strictor.274069.6675.9362
Download: download sample
File size:5'352'896 bytes
First seen:2023-12-09 12:27:45 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 134f827d0d6264fd1f1e3d1f2a7a7ab7
ssdeep 98304:Vhphy6SpVKfHLZlIPxxme7wltblhyATyK5lzalYQ:jPErMsPx+tblhyQalYQ
Threatray 19 similar samples on MalwareBazaar
TLSH T1E1464C807846B3E3F1A22F34451ACA71B3519C22065F67C76E8B7E5AE9F4643AD39F01
TrID 68.8% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
12.5% (.EXE) Win64 Executable (generic) (10523/12/4)
6.0% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.4% (.EXE) OS/2 Executable (generic) (2029/13)
dhash icon 71e8c8bace94f0e1
Reporter SecuriteInfoCom
Tags:exe signed

Code Signing Certificate

Organisation:Xenarmor Global Security Solutions Private Limited
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:2021-01-12T00:00:00Z
Valid to:2024-01-12T23:59:59Z
Serial number: 2d88e70fc23500ba74a806a9588f3c6b
Thumbprint Algorithm:SHA256
Thumbprint: 3d82687cdb3adbf5e696a7dc7b8d91f89e55b2fff586d0982b432048cb38d7ca
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
291
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
Creating a file
Sending a custom TCP request
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
90%
Tags:
anti-vm control crypto evasive explorer fingerprint greyware hook keylogger lolbin masquerade overlay packed remote shell32 stealer virus xenarmor
Verdict:
Malicious
Labled as:
SecurityXploded.AR potentially unsafe application
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw
Score:
60 / 100
Signature
Contains functionality to modify clipboard data
Contains functionality to steal e-mail passwords
Multi AV Scanner detection for submitted file
Tries to steal Mail credentials (via file registry)
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2021-07-12 11:19:15 UTC
File Type:
PE (Exe)
Extracted files:
127
AV detection:
13 of 37 (35.14%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Unpacked files
SH256 hash:
baecc747370a4c396ef5403a3a2b286465d8fe4677bf1bfd23b8164ef5c22bbb
MD5 hash:
a48e3197ab0f64c4684f0828f742165c
SHA1 hash:
f935c3d6f9601c795f2211e34b3778fad14442b4
Detections:
INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:Check_OutputDebugStringA_iat
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Email_stealer_bin_mem
Author:James_inthe_box
Description:Email in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients
Author:ditekSHen
Description:Detects executables referencing many file transfer clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:QbotStuff
Author:anonymous
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:Sectigo_Code_Signed
Description:Detects code signed by the Sectigo RSA Code Signing CA
Reference:https://bazaar.abuse.ch/export/csv/cscb/
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com
Rule name:yara_template

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments