MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bb2422e96ea993007f25c71d55b2eddfa1e940c89e895abb50dd07d7c17ca1df. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 5 File information Comments

SHA256 hash: bb2422e96ea993007f25c71d55b2eddfa1e940c89e895abb50dd07d7c17ca1df
SHA3-384 hash: 695c10930ef1d6b58a6e6a5a6b7b35c5a65bf2e1fd1adea7e8c82372dcf8c9a19dd77a206fc70401000b3b12f16bd1f5
SHA1 hash: 48f03a13b0f6d3d929a86514ce48a9352ffef5ad
MD5 hash: 5ebfc0af031130ba9de1d5d3275734b3
humanhash: ack-golf-early-north
File name:5ebfc0af031130ba9de1d5d3275734b3
Download: download sample
File size:1'208'392 bytes
First seen:2023-04-04 13:57:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3db9de43d5d530c10d0cd2d43c7a0771
ssdeep 24576:26YM8eYFtU1Dj9qsu26EhWN/l2OxysRif9F/wXKbKDnLtg:3D8eYFtU1/9qsjfMsODW9F4XiKtg
Threatray 4 similar samples on MalwareBazaar
TLSH T1B5451212D2424476D4BAC17DCAC24A52FAF9FC0623A592CFB72CC54567623E4E77E3A0
TrID 74.9% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
4.0% (.EXE) Win64 Executable (generic) (10523/12/4)
2.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.9% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter tech_skeech
Tags:exe signed

Code Signing Certificate

Organisation:Wuhan Jiajia Yiyong Technology Co., Ltd.
Issuer:DigiCert EV Code Signing CA
Algorithm:sha1WithRSAEncryption
Valid from:2020-11-17T00:00:00Z
Valid to:2023-11-12T23:59:59Z
Serial number: 012eab44fa8853d913e7107c89406432
Intelligence: 3 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: aec559802610390a6bd865cffc472fa57c61f1c37a880375b0aeb2e4c591c53d
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
239
Origin country :
RO RO
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
explorer.exe greyware overlay packed scranos
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
52 / 100
Signature
Found driver which could be used to inject code into processes
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Scranos
Status:
Malicious
First seen:
2023-04-03 08:52:51 UTC
File Type:
PE+ (Sys)
Extracted files:
4
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Unpacked files
SH256 hash:
bb2422e96ea993007f25c71d55b2eddfa1e940c89e895abb50dd07d7c17ca1df
MD5 hash:
5ebfc0af031130ba9de1d5d3275734b3
SHA1 hash:
48f03a13b0f6d3d929a86514ce48a9352ffef5ad
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:Suspicious_Macro_Presence
Author:Mehmet Ali Kerimoglu (CYB3RMX)
Description:This rule detects common malicious/suspicious implementations.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe bb2422e96ea993007f25c71d55b2eddfa1e940c89e895abb50dd07d7c17ca1df

(this sample)

  
Delivery method
Distributed via web download

Comments