MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 be5f53f3c41671c23e00ce8665c75ffd1ce170fd0e098309417d009013b51f2d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments 1

SHA256 hash: be5f53f3c41671c23e00ce8665c75ffd1ce170fd0e098309417d009013b51f2d
SHA3-384 hash: 59c309b528ffb30018eeb7d1c1891983b49190430441165a7bae03882d06ecf6173a4a2d1472f61c17123d763422f387
SHA1 hash: 35f425ba123a590c1aff3371550cdecc159ff0b5
MD5 hash: 9c95f2e7876d1f532a5f71ae0e2e75d9
humanhash: cardinal-lamp-yellow-east
File name:9c95f2e7876d1f532a5f71ae0e2e75d9
Download: download sample
File size:505'856 bytes
First seen:2022-01-03 03:06:28 UTC
Last seen:2022-01-03 04:47:26 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1ed7a88cd635fb16b2c1cea18cb18f1c
ssdeep 12288:ll1aDkdKk46wSR0f6RdQZRMF9eFLK9EJcP2PCzMK:lfIwCnONdQIiTcP4Cz
Threatray 77 similar samples on MalwareBazaar
TLSH T19FB4CF00B7A1C035F6B311F44A7AA2A8B53E7EE15B2450CB53D52AED6B356E0EC3135B
File icon (PE):PE icon
dhash icon 68e8c8e8aa66a499 (3 x RaccoonStealer, 1 x ArkeiStealer)
Reporter zbetcheckin
Tags:32 exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
171
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
9c95f2e7876d1f532a5f71ae0e2e75d9
Verdict:
Malicious activity
Analysis date:
2022-01-03 03:10:34 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a file in the %AppData% subdirectories
Creating a file in the %temp% directory
Creating a process from a recently created file
Launching the default Windows debugger (dwwin.exe)
Searching for the window
DNS request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
SystemUptime
MeasuringTime
CheckCmdLine
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware packed tofsee
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
88 / 100
Signature
Creates autostart registry keys with suspicious names
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Raccrypt
Status:
Malicious
First seen:
2022-01-03 03:07:09 UTC
File Type:
PE (Exe)
Extracted files:
16
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence
Behaviour
Suspicious use of WriteProcessMemory
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe be5f53f3c41671c23e00ce8665c75ffd1ce170fd0e098309417d009013b51f2d

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-01-03 03:06:29 UTC

url : hxxp://181.214.152.249/blog/posts/sufile.exe