MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bbd38db9e8da82fea89f438e3487aa253733392f1ca67aea7d46887db10e0908. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: bbd38db9e8da82fea89f438e3487aa253733392f1ca67aea7d46887db10e0908
SHA3-384 hash: 9e0075808b925e016a2cce85663572605c4dacf5067f74c30302be1646a0e9392fade5205751c300865e86d6e9c6fb57
SHA1 hash: ae3e18e6607557f3b906f761e490c06aaefd0ab4
MD5 hash: be63c4d9076eee17520593a04324fff8
humanhash: batman-single-east-kentucky
File name:STATEMENT OF ACCOUNT JUNE 2024.rar
Download: download sample
File size:718'274 bytes
First seen:2024-06-20 13:51:21 UTC
Last seen:2024-06-20 13:52:48 UTC
File type: rar
MIME type:application/x-rar
ssdeep 12288:AuPEsONeBlOO194EuV+y5QagvRDvVFwg5wCpKeWkommlM5zUlrNzrYQYLAo:JYolOO194ECIaQDNFL1eQATzrH4
TLSH T13DE423FA2EDCF8A22423CEAD13523BC5B70461588BBDCD791590B38D59F66063BCA1D1
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Reporter cocaman
Tags:rar


Avatar
cocaman
Malicious email (T1566.001)
From: "invoicing1@pentronic.com.my" (likely spoofed)
Received: "from [141.98.10.79] (unknown [141.98.10.79]) "
Date: "20 Jun 2024 03:11:49 +0200"
Subject: "Statement of Account as at 20 June, 2024"
Attachment: "STATEMENT OF ACCOUNT JUNE 2024.rar"

Intelligence


File Origin
# of uploads :
2
# of downloads :
83
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:STATEMENT OF ACCOUNT JUNE 2024.exe
File size:749'056 bytes
SHA256 hash: e09cea5d3b4bf7d901f90add8895ba706e26f1792bdcdcb94807f42ae9c23c59
MD5 hash: b1153d09a96876b34915bd390d1f8f4b
MIME type:application/x-dosexec
Vendor Threat Intelligence
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
masquerade obfuscated packed vbnet
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.Zmutzy
Status:
Malicious
First seen:
2024-06-20 01:11:58 UTC
File Type:
Binary (Archive)
Extracted files:
2
AV detection:
16 of 38 (42.11%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_no_import_table
Description:Detect pe file that no import table

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

rar bbd38db9e8da82fea89f438e3487aa253733392f1ca67aea7d46887db10e0908

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments