MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bd55838fd63728855d0d248b66d82083e10847172a32ac5fb98b9d200f8f8286. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Pushdo


Vendor detections: 13


Intelligence 13 IOCs YARA 6 File information Comments 1

SHA256 hash: bd55838fd63728855d0d248b66d82083e10847172a32ac5fb98b9d200f8f8286
SHA3-384 hash: 9fb4e150bf5ca3c96cbd4f03a28a099af58519bcf6d5bde5ac89925b5b161c8f45b3f6a4a1629ad7112a34261c9cc164
SHA1 hash: 0c1f41547db34e0711978d7f8d602fd2518e2103
MD5 hash: a92eecf0f9e2a03bb9a5554828f6f013
humanhash: oscar-twelve-gee-asparagus
File name:a92eecf0f9e2a03bb9a5554828f6f013
Download: download sample
Signature Pushdo
File size:2'385'920 bytes
First seen:2024-01-31 14:34:45 UTC
Last seen:2024-01-31 18:22:27 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4bb1d4117812caecf3964e4cb63d4bfd (1 x Pushdo)
ssdeep 49152:exwjmesOEIJVdIOwPHwwYZRYEoWLQV7iv/nPVQMkiXrqaM1Ex:iwpIPfYZRYEnLQVuv/PVQaqaMa
TLSH T1B0B5BF93F5687E72C1B89D7B832A401CCB18606B8F824B15B54FB1AD7DDB186BC60F25
TrID 40.3% (.EXE) Win64 Executable (generic) (10523/12/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4505/5/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter zbetcheckin
Tags:32 exe Pushdo

Intelligence


File Origin
# of uploads :
2
# of downloads :
284
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
bd55838fd63728855d0d248b66d82083e10847172a32ac5fb98b9d200f8f8286.exe
Verdict:
Malicious activity
Analysis date:
2024-01-31 14:36:46 UTC
Tags:
pushdo cutwail backdoor sinkhole opendir

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Detected unpacking (creates a PE file in dynamic memory)
Drops PE files to the user root directory
Found evasive API chain (may stop execution after checking mutex)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Send many emails (e-Mail Spam)
Sigma detected: Suspect Svchost Activity
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to resolve many domain names, but no domain seems valid
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected Backdoor Pushdo
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1384141 Sample: a5hbkmGD7N.exe Startdate: 31/01/2024 Architecture: WINDOWS Score: 100 49 zupraha.cz 2->49 51 www.valselit.com 2->51 53 1389 other IPs or domains 2->53 93 Snort IDS alert for network traffic 2->93 95 Multi AV Scanner detection for domain / URL 2->95 97 Antivirus detection for URL or domain 2->97 99 7 other signatures 2->99 8 a5hbkmGD7N.exe 3 68 2->8         started        13 pigalicapi.exe 48 2->13         started        15 pigalicapi.exe 48 2->15         started        signatures3 process4 dnsIp5 55 websy.com 13.248.169.48 AMAZON-02US United States 8->55 57 108.167.164.216 UNIFIEDLAYER-AS-1US United States 8->57 63 28 other IPs or domains 8->63 43 C:\Users\user\pigalicapi.exe, PE32 8->43 dropped 101 Detected unpacking (creates a PE file in dynamic memory) 8->101 103 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 8->103 105 Contains functionality to inject threads in other processes 8->105 119 2 other signatures 8->119 17 svchost.exe 8->17         started        59 www.omp.obs-mip.fr 13->59 65 3 other IPs or domains 13->65 107 Writes to foreign memory regions 13->107 109 Allocates memory in foreign processes 13->109 111 Injects a PE file into a foreign processes 13->111 21 svchost.exe 13->21         started        61 xinhui.net 15->61 67 42 other IPs or domains 15->67 113 Multi AV Scanner detection for dropped file 15->113 115 Machine Learning detection for dropped file 15->115 117 Contains functionality to compare user and computer (likely to detect sandboxes) 15->117 23 svchost.exe 15->23         started        file6 signatures7 process8 dnsIp9 45 gmail-smtp-in.l.google.com 173.194.219.26 GOOGLEUS United States 17->45 83 System process connects to network (likely due to code injection or exploit) 17->83 85 Found evasive API chain (may stop execution after checking mutex) 17->85 87 Contains functionality to inject threads in other processes 17->87 89 Contains functionality to detect sleep reduction / modifications 17->89 25 svchost.exe 17->25         started        29 svchost.exe 17->29         started        31 svchost.exe 17->31         started        33 svchost.exe 12 17->33         started        47 alh.com 21->47 91 Injects a PE file into a foreign processes 21->91 35 svchost.exe 21->35         started        37 svchost.exe 21->37         started        39 svchost.exe 21->39         started        41 svchost.exe 21->41         started        signatures10 process11 dnsIp12 69 26 other IPs or domains 25->69 121 System process connects to network (likely due to code injection or exploit) 25->121 71 25 other IPs or domains 29->71 73 734 other IPs or domains 31->73 75 27 other IPs or domains 33->75 77 17 other IPs or domains 35->77 79 7 other IPs or domains 37->79 81 4 other IPs or domains 39->81 signatures13
Threat name:
Win32.Trojan.Smokeloader
Status:
Malicious
First seen:
2024-01-31 14:35:06 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  7/10
Tags:
persistence upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
UPX packed file
Unpacked files
SH256 hash:
f812cff25ac78391ad0621231aa8556d459a3cea3205a04b097744f1e0116a60
MD5 hash:
ab0fa68fdf4a67b3a404250f073e15ba
SHA1 hash:
7eb499acfbe7a3d4d536ab2de8e95be4d7234bbf
SH256 hash:
ece202050373fa2268814214bf0e6e4b71157dac06f25ed2bd95a6e5d3827cf8
MD5 hash:
f81f843b3cb6edf6173f32907c76c093
SHA1 hash:
38a36e8a5b4fe36e02734df5960eb274c46a932e
Detections:
pushdo win_pushdo_auto
SH256 hash:
bd55838fd63728855d0d248b66d82083e10847172a32ac5fb98b9d200f8f8286
MD5 hash:
a92eecf0f9e2a03bb9a5554828f6f013
SHA1 hash:
0c1f41547db34e0711978d7f8d602fd2518e2103
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:win_pushdo_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.pushdo.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Pushdo

Executable exe bd55838fd63728855d0d248b66d82083e10847172a32ac5fb98b9d200f8f8286

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2024-01-31 14:34:46 UTC

url : hxxp://a0912696.xsph.ru/logo2.jpg