MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bc59db37246f115d1f8e57e17a1f26fafe6bd286362a0ec13e5b67dcf05f0ead. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 6 File information Comments

SHA256 hash: bc59db37246f115d1f8e57e17a1f26fafe6bd286362a0ec13e5b67dcf05f0ead
SHA3-384 hash: 63836cfcd0b27219c3d80301ae976304dca94766274d70b43e4cd56a529f3466caa1c42d2d1ffd2ffe8ad83ec8c69bdb
SHA1 hash: 6437747b9d08cc2af1891c2813ff118a96020018
MD5 hash: 0e533129c1515081d6cecde1314fa5bc
humanhash: autumn-north-batman-spring
File name:reciept screenshot.lnk
Download: download sample
File size:1'784 bytes
First seen:2024-10-26 05:47:33 UTC
Last seen:Never
File type:Shortcut (lnk) lnk
MIME type:application/octet-stream
ssdeep 24:8mCJpdZn48RjFA1P5J+/RU4I0WSQB0B23yD3X5l11dzm/LFtVMwrXQaR3+yprKgG:8nfnBu/eLIjyDH5l1spXv3PrKgYk
TLSH T1CE31120A7ACD9732C1B249374896E2604232BD12F983DF6E51D04A8C2C57305E925E6A
Magika lnk
Reporter abuse_ch
Tags:lnk

Intelligence


File Origin
# of uploads :
1
# of downloads :
87
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.9%
Tags:
Powershell Infosteal
Result
Verdict:
Malicious
File Type:
LNK File - Malicious
Behaviour
BlacklistAPI detected
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
cmd lolbin masquerade
Result
Verdict:
SUSPICIOUS
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
AI detected suspicious sample
Machine Learning detection for sample
Windows shortcut file (LNK) starts blacklisted processes
Behaviour
Behavior Graph:
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Execution_in_LNK
Author:@bartblaze
Description:Identifies execution artefacts in shortcut (LNK) files.
Rule name:EXE_in_LNK
Author:@bartblaze
Description:Identifies executable artefacts in shortcut (LNK) files.
Rule name:LNK_sospechosos
Author:Germán Fernández
Description:Detecta archivos .lnk sospechosos
Rule name:Long_RelativePath_LNK
Author:@bartblaze
Description:Identifies shortcut (LNK) file with a long relative path. Might be used in an attempt to hide the path.
Rule name:SUSP_LNK_CMD
Author:SECUINFRA Falcon Team
Description:Detects the reference to cmd.exe inside an lnk file, which is suspicious
Rule name:SUSP_LNK_SmallScreenSize
Author:Greg Lesnewich
Description:check for LNKs that have a screen buffer size and WindowSize dimensions of 1x1

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments