MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 bd7fc202d7669e5274554be14461ce65913e388c14500a3e774b1fe9d8d08700. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 3
| SHA256 hash: | bd7fc202d7669e5274554be14461ce65913e388c14500a3e774b1fe9d8d08700 |
|---|---|
| SHA3-384 hash: | adeaffde315a48382d29f14e84dcbf89b2ea907321365570f905a486a8c88b8d8f754ed7ab9181b652f275b47816cc8a |
| SHA1 hash: | 750bf411d5e68cb40d0ad97d71bcd7b68402e27f |
| MD5 hash: | f0b92582513f9e8040670e6bb30256c8 |
| humanhash: | magazine-angel-johnny-finch |
| File name: | SecuriteInfo.com.0053ed151.1946 |
| Download: | download sample |
| File size: | 7'863'137 bytes |
| First seen: | 2020-05-17 13:38:31 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 1f23f452093b5c1ff091a2f9fb4fa3e9 (274 x GuLoader, 36 x RemcosRAT, 23 x AgentTesla) |
| ssdeep | 196608:CRA4IhPDXEGPlRjw0MJ3CNREj1OjWhG2h9v1Fls0FVBH:lLdgelRwP8Ej1JhG2h9vHi2VF |
| Threatray | 26 similar samples on MalwareBazaar |
| TLSH | 8D8633BE3072C267C92723FF48F1AB61AA38750F8259EA43CB109FFD81571961658B17 |
| Reporter |
Intelligence
File Origin
# of uploads :
1
# of downloads :
101
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Garvi
Status:
Malicious
First seen:
2020-05-13 15:35:18 UTC
File Type:
PE (Exe)
Extracted files:
935
AV detection:
21 of 31 (67.74%)
Threat level:
5/5
Verdict:
malicious
Similar samples:
+ 16 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
1/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
exe bd7fc202d7669e5274554be14461ce65913e388c14500a3e774b1fe9d8d08700
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.Slight edit (since I can't update my first comment), the Chrome extension is bundled in the initial installer application.
Uses a compiled Python script (load.pyc) to create persistence through scheduled tasks and run keys. Performs DNS lookup to get TXT record of embedded domain (bestlivestat[.]com) which would have returned a base64 encoded URL. I did not see any TXT records for the domain. If the record exists, downloads a JSON config which contains a file to download and execute. Installations tracked via Google Analytics. Also checks for Chrome, Yandex and Opera browsers.
When run through any.run (https://app.any.run/tasks/515f7c4f-1d87-49cf-a7ae-25050cfdb474) it installed an older version of the "Yandex.Market Adviser" Chrome extension (ID: mcfckchjhehcdgoeihjjjbkcdpdfmloa).