MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 bd85259d7078c4fc3749bde57165848d3575d32bcb45d88572cd4d6c73b89170. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 5
| SHA256 hash: | bd85259d7078c4fc3749bde57165848d3575d32bcb45d88572cd4d6c73b89170 |
|---|---|
| SHA3-384 hash: | 7f25f615d444715cbef49a7c5cd97b0fb0a32ef33b08f743321b7fba6494f32615fd613c310896a27703e22a44a635f2 |
| SHA1 hash: | dca42f71ed1613aa2f25335b1157ee45b847a222 |
| MD5 hash: | e923d6180d21886bfdfedcfc77b53695 |
| humanhash: | pizza-eight-johnny-purple |
| File name: | e923d6180d21886bfdfedcfc77b53695 |
| Download: | download sample |
| File size: | 235'008 bytes |
| First seen: | 2021-09-04 12:34:39 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 7182b1ea6f92adbf459a2c65d8d4dd9e (5 x CoinMiner, 4 x RedLineStealer, 4 x DCRat) |
| ssdeep | 6144:bt5hBPi0BW69hd1MMdxPe9N9uA069TBJqtS+p9fu:btzww69TbqhU |
| Threatray | 84 similar samples on MalwareBazaar |
| TLSH | T14D344A62B2D40088DAE284B9E9429B06E6727C34476173E76BB533B3173B4C69F7D391 |
| dhash icon | 1270cca8b8f0f010 |
| Reporter | |
| Tags: | exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
142
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e923d6180d21886bfdfedcfc77b53695
Verdict:
No threats detected
Analysis date:
2021-09-04 12:37:45 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Launching a process
Creating a file
Transferring files using the Background Intelligent Transfer Service (BITS)
DNS request
Connection attempt
Sending a custom TCP request
Enabling the 'hidden' option for files in the %temp% directory
Moving a recently created file
Creating a process from a recently created file
Launching a service
Creating a window
Sending a UDP request
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
57 / 100
Signature
Adds a directory exclusion to Windows Defender
Modifies the windows firewall
Multi AV Scanner detection for submitted file
Sigma detected: Powershell adding suspicious path to exclusion list
Sigma detected: Powershell Defender Exclusion
Tries to download files via bitsadmin
Uses netsh to modify the Windows network and firewall settings
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Leopard
Status:
Malicious
First seen:
2021-08-30 20:22:52 UTC
AV detection:
18 of 27 (66.67%)
Threat level:
5/5
Verdict:
suspicious
Similar samples:
+ 74 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
10/10
Tags:
evasion trojan
Behaviour
Download via BitsAdmin
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Downloads MZ/PE file
Modifies Windows Firewall
UAC bypass
Unpacked files
SH256 hash:
bd85259d7078c4fc3749bde57165848d3575d32bcb45d88572cd4d6c73b89170
MD5 hash:
e923d6180d21886bfdfedcfc77b53695
SHA1 hash:
dca42f71ed1613aa2f25335b1157ee45b847a222
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
exe bd85259d7078c4fc3749bde57165848d3575d32bcb45d88572cd4d6c73b89170
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.