MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bda942e7765c6aaca064d28e3ebab5a7c22be23469b4c4a8b07f907229b7ff25. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 7 File information Comments

SHA256 hash: bda942e7765c6aaca064d28e3ebab5a7c22be23469b4c4a8b07f907229b7ff25
SHA3-384 hash: f21a8391425c4ae204596a8a2dece9eff24fd8dcfe6f0f70aa629261198409977e3a82b26cbb6ac9ad5f835dbbf984cc
SHA1 hash: f2db04769b8227882aaca73a1f49e1afc3b0b14f
MD5 hash: 399f290d4092909f40188d037c75001e
humanhash: high-autumn-missouri-jersey
File name:bda942e7765c6aaca064d28e3ebab5a7c22be23469b4c4a8b07f907229b7ff25
Download: download sample
File size:6'967'140 bytes
First seen:2021-04-05 09:32:41 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4df47bd79d7fe79953651a03293f0e8f (4 x Mimikatz, 3 x Beapy, 1 x Quakbot)
ssdeep 196608:eAqjTpnhXlmyWCZNulPKQ8hY/Bkr/fOIT/+VdlBFKazC:kfauN/HYOSIT/EVF9u
Threatray 723 similar samples on MalwareBazaar
TLSH 71663381F0928CBAE8F611371AB6D1353E7AF5230B0585AF639C5A977A303D1A77C61C
Reporter JAMESWT_WT
Tags:Shenzhen Smartspace Software technology Co.Limited signed

Code Signing Certificate

Organisation:Shenzhen Smartspace Software technology Co.,Limited
Issuer:VeriSign Class 3 Code Signing 2010 CA
Algorithm:sha1WithRSAEncryption
Valid from:2015-04-21T00:00:00Z
Valid to:2017-04-19T23:59:59Z
Serial number: 559cb90fd16e9d1ad375f050ab6a6616
Intelligence: 30 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 9a069ab39b6703bad84b3ddf1d3c7f5e98b5e804d45a2b8e447590f6c5f96dc6
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
154
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
bda942e7765c6aaca064d28e3ebab5a7c22be23469b4c4a8b07f907229b7ff25
Verdict:
Malicious activity
Analysis date:
2021-04-05 09:45:15 UTC
Tags:
trojan mimikatz

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Sending a UDP request
Running batch commands
Launching a process
Creating a file
Launching the process to interact with network services
Creating a process from a recently created file
Creating a window
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Mimikatz
Detection:
malicious
Classification:
expl.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Detected Hacktool Mimikatz
Found suspicious powershell code related to unpacking or dynamic code loading
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Uses ipconfig to lookup or modify the Windows network settings
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 381896 Sample: lVCeaw1M4v Startdate: 05/04/2021 Architecture: WINDOWS Score: 100 51 info.ackng.com 2->51 53 info.abbny.com 2->53 55 2 other IPs or domains 2->55 63 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->63 65 Multi AV Scanner detection for domain / URL 2->65 67 Malicious sample detected (through community Yara rule) 2->67 69 5 other signatures 2->69 10 lVCeaw1M4v.exe 34 2->10         started        signatures3 process4 file5 41 C:\Users\user\AppData\Local\...\win32wnet.pyd, PE32 10->41 dropped 43 C:\Users\user\AppData\Local\...\win32pipe.pyd, PE32 10->43 dropped 45 C:\Users\user\AppData\...\win32event.pyd, PE32 10->45 dropped 47 25 other files (none is malicious) 10->47 dropped 13 lVCeaw1M4v.exe 3 10->13         started        18 conhost.exe 10->18         started        process6 dnsIp7 57 192.168.0.1, 1433 unknown unknown 13->57 59 192.168.0.10, 1433 unknown unknown 13->59 61 105 other IPs or domains 13->61 49 C:\Users\user\Desktop\m2.ps1, ASCII 13->49 dropped 75 Connects to many different private IPs via SMB (likely to spread or exploit) 13->75 77 Connects to many different private IPs (likely to spread or exploit) 13->77 20 cmd.exe 1 13->20         started        23 powershell.exe 18 13->23         started        25 cmd.exe 1 13->25         started        27 2 other processes 13->27 file8 signatures9 process10 signatures11 71 Uses ipconfig to lookup or modify the Windows network settings 20->71 29 WMIC.exe 1 20->29         started        73 Found suspicious powershell code related to unpacking or dynamic code loading 23->73 31 net.exe 1 25->31         started        33 net.exe 1 27->33         started        35 ipconfig.exe 27->35         started        process12 process13 37 net1.exe 1 31->37         started        39 net1.exe 1 33->39         started       
Threat name:
Win32.Trojan.InjectPyinc
Status:
Malicious
First seen:
2021-01-23 01:42:00 UTC
File Type:
PE (Exe)
Extracted files:
452
AV detection:
26 of 28 (92.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
evasion pyinstaller
Behaviour
Creates scheduled task(s)
Gathers network information
Modifies data under HKEY_USERS
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Detects Pyinstaller
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Loads dropped DLL
Modifies Windows Firewall
Grants admin privileges
Unpacked files
SH256 hash:
5e55153dc64ff396046fe1553a12bf8584f29cd84b1899c40646e37998d30aa2
MD5 hash:
f890be6da909eeb8ba5f7ebcb01d59f9
SHA1 hash:
f5ca85a259b8145615c46f61688369913a243843
SH256 hash:
edec30653dc56df03eb40fa97c616950fd593c0b90c2950af722e66816eb70e9
MD5 hash:
5b44d0bd38c218445dde8c913736eaac
SHA1 hash:
dc778e6dc62006a5ccd1f206c3000e32b4439592
SH256 hash:
e3eed66221a6552d4b9ae7350b3dc30de238a6029efae060514d2780c02fedb4
MD5 hash:
f5c5c0d5d9e93d6e8cb66b825cd06230
SHA1 hash:
da7be79dd502a89cf6f23476e5f661eebd89342b
SH256 hash:
075316c2e6fe471b40d7377d3885fe3f305eaa7d4dc9a36155985acc2cd14f83
MD5 hash:
c02566fd7171036b0b6dfc34a091d051
SHA1 hash:
0f3a9f64b618fc801a77b083684c9b2bffd90198
SH256 hash:
3ca9c0ff13262379669b6512672f1908d1f0648d5f0e463d94c6ec8169262bd9
MD5 hash:
ea758bd12cc27df5fc5c6ad9e4102c89
SHA1 hash:
833cf9561c4bd271b1643545c33eed869a562856
SH256 hash:
ea0efcab32e6572f61a3c765356e283bd6a8f75ec2a4c8b12f1fb3db76ca68d4
MD5 hash:
27a7a40b2b83578e0c3bffb5a167d67a
SHA1 hash:
d20a7d3308990ce04839569b66f8639d6ed55848
SH256 hash:
18733890e570299ea5e84e3a739c1cd6da1e7bb303398a5837f45da8ee0504e0
MD5 hash:
02ad465a8178fc0cf1d684e15e01d014
SHA1 hash:
ee2eb01548ec0a5fe85fc4b140e484748bbb7586
SH256 hash:
45371c7a152955b087af6f6b2d6cbff37235d0d85c3c833f6a69096f954bb929
MD5 hash:
4efd8ed1259f47cfad22fff7e1fe3b52
SHA1 hash:
b52b21e6ed680d6d0a02d7f71900da4daa66638d
SH256 hash:
7a79ccfec0224c5462b9526ce65f7f3881319ca1b9fa26bc46f09ab631c4da26
MD5 hash:
c76a559c8c13422b41111f2c95d0691d
SHA1 hash:
9ff38f4b01c24c5aa0463139658fef08cac9b112
SH256 hash:
e74c365ae56c2bff621c3fa548035c45fd1f3735c0bcb1c321b8332cd5ef0b5c
MD5 hash:
788b8058878e95ac12e52807770a9840
SHA1 hash:
9f4ff23c1e77fd810d50d6d753a1e68457e000cb
SH256 hash:
24cde2d9ecd9a596d74cee0af3c5cad0e16ab6f4e04e56d9a6d233b24ad32aae
MD5 hash:
0c8434f899300f936fc4031c5cb1d2b3
SHA1 hash:
515fe1f6f974e5ae38ad13a84b9da116a7fdbc0f
SH256 hash:
b48e9d4b0f5866f48282c4c11e0d9cdfc34bae7925bdbbca90cc1eec20de054e
MD5 hash:
9caaccc6e98ad6953f070fd9f1b65af7
SHA1 hash:
4a91a3f519062fee9508205965aad77fea8e4156
SH256 hash:
2466dbb947a036c760dce129cbfb4c197d5e45e44868b5db1103598eb9733457
MD5 hash:
68ece3556d8a9b3132fd871f2b5f8189
SHA1 hash:
2a6d62416b4b00527f0ecdd8fee2f313d4ff136f
SH256 hash:
69e65b991801d5fcb8db712c00326fe2cb7c153871b89f17e26354e6bcb3079d
MD5 hash:
a717034055151e0405d71d331e5cf33b
SHA1 hash:
1cc1aa88452a3dd4b7672393385e02f3e068c947
SH256 hash:
e65100feb3a20ac657c2257032aa801ec9300a5e66913337021d1ebe0b1f604d
MD5 hash:
8b59e4881a8698b0baaf02c15c914115
SHA1 hash:
1bb971397e76a161cd327c1298fee9eaab3497eb
SH256 hash:
ecbae44cb6f68bd5427bff4a1de20f272480708ffa83150c46081e9e8571c8c2
MD5 hash:
03c2069403170035bbfe1c5a595cddbc
SHA1 hash:
0ae19b1576833dca59f732e9ca61b2c813a84099
SH256 hash:
bda942e7765c6aaca064d28e3ebab5a7c22be23469b4c4a8b07f907229b7ff25
MD5 hash:
399f290d4092909f40188d037c75001e
SHA1 hash:
f2db04769b8227882aaca73a1f49e1afc3b0b14f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Impacket
Author:@bartblaze
Description:Identifies Impacket, a collection of Python classes for working with network protocols.
Reference:https://github.com/SecureAuthCorp/impacket
Rule name:Impacket_Keyword
Author:Florian Roth
Description:Detects Impacket Keyword in Executable
Reference:Internal Research
Rule name:Impacket_Lateral_Movement
Author:Markus Neis
Description:Detects Impacket Network Aktivity for Lateral Movement
Reference:https://github.com/CoreSecurity/impacket
Rule name:Impacket_Tools_psexec
Author:Florian Roth
Description:Compiled Impacket Tools
Reference:https://github.com/maaaaz/impacket-examples-windows
Rule name:INDICATOR_TOOL_LTM_CompiledImpacket
Author:ditekSHen
Description:Detects executables of compiled Impacket's python scripts
Rule name:PE_File_pyinstaller
Author:Didier Stevens (https://DidierStevens.com)
Description:Detect PE file produced by pyinstaller
Reference:https://isc.sans.edu/diary/21057
Rule name:PyInstaller
Author:@bartblaze
Description:Identifies executable converted using PyInstaller.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments