MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 be7445fcea2908a4755bc89ab529dbb630374a32e2cd37d6aaab0134e136b04c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: be7445fcea2908a4755bc89ab529dbb630374a32e2cd37d6aaab0134e136b04c
SHA3-384 hash: 7e60249417bc02855fc1ac3d56de95b5fabb5d837abc5b5aefc29bf9931140694d9ba979ae90fab939dd98f881f0c893
SHA1 hash: 19b91482f278a2420fe72d44c2753f99470ff1a7
MD5 hash: e45cc08c947250b27be10b23e7ee04c4
humanhash: burger-mississippi-pluto-carbon
File name:Exoblast_Setup.exe
Download: download sample
File size:35'833'648 bytes
First seen:2022-03-05 15:53:22 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d1de500e42d2702177623521d4e86120
ssdeep 786432:n/bD+iTzMjBUQz/CKkj5sDDsXlK9Xb5tXVO9623T0w4o:n/bDAj0KCKN5291ll
TLSH T1597733373237854EE0BE55B197622F5AB421B9150A2DC7094E99BEF9F4B3ED08F22344
File icon (PE):PE icon
dhash icon 0814b2b2b2320c10
Reporter Anonymous
Tags:exe


Avatar
Anonymous
Retrieved from: https://cdn.discordapp.com/attachments/948706472987070524/948706538804117545/Exoblast_Setup.exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
399
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Creating a process from a recently created file
DNS request
Sending a custom TCP request
Creating a file in the %temp% directory
Result
Verdict:
UNKNOWN
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
48 / 100
Signature
DLL side loading technique detected
May check the online IP address of the machine
Behaviour
Behavior Graph:
Gathering data
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware stealer
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Looks up external IP address via web service
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe be7445fcea2908a4755bc89ab529dbb630374a32e2cd37d6aaab0134e136b04c

(this sample)

  
Delivery method
Distributed via web download

Comments