MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bf375d5c15abb5c57b0cc3371a3537b79560fe82b1aff486afde752e05971ebb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: bf375d5c15abb5c57b0cc3371a3537b79560fe82b1aff486afde752e05971ebb
SHA3-384 hash: ae79c736e24f89a662de05f13bda87c6246cef83a6922d84f5f17ee364400eeae7e68ba040792dc96090b1dfda970427
SHA1 hash: 973969a79a40b1ebb3010189cc9f5441ac90a218
MD5 hash: 46008207efa9377a202c5c113f5b2cd5
humanhash: five-connecticut-uncle-butter
File name:bf375d5c15abb5c57b0cc3371a3537b79560fe82b1aff486afde752e05971ebb
Download: download sample
File size:2'996'300 bytes
First seen:2021-02-28 07:25:18 UTC
Last seen:2021-02-28 08:59:28 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1daf4a4a7f58af2dc5d92ef5205a04ba (2 x CoinMiner, 1 x njrat)
ssdeep 49152:ZL0aooOGSVzMkQ03AjXqJrSvEswW3rOl+bdnkWPcMXBSmhY48P7G8yfFD:ZL03pGSVzdQ03AjXybnwrK+bd1PcMX84
Threatray 241 similar samples on MalwareBazaar
TLSH 47D53373AB6D054CEE0F18B8063F878F507C1DD3F66EA6C28E6C1EDA16DBA646421854
Reporter JAMESWT_WT

Intelligence


File Origin
# of uploads :
2
# of downloads :
590
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
bf375d5c15abb5c57b0cc3371a3537b79560fe82b1aff486afde752e05971ebb
Verdict:
Malicious activity
Analysis date:
2021-02-28 08:17:56 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for analyzing tools
Searching for the window
Creating a file in the %temp% directory
Sending a UDP request
Creating a process from a recently created file
Enabling the 'hidden' option for files in the %temp% directory
Launching the default Windows debugger (dwwin.exe)
Creating a window
Creating a file in the %AppData% subdirectories
Running batch commands
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Creating a file
Launching a process
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains in memory code execution
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Creates multiple autostart registry keys
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sigma detected: Executables Started in Suspicious Folder
Sigma detected: Execution in Non-Executable Folder
Sigma detected: Suspicious Program Location Process Starts
Sigma detected: System File Execution Location Anomaly
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Uses schtasks.exe or at.exe to add and modify task schedules
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 359385 Sample: 7WOEdMm3zt Startdate: 28/02/2021 Architecture: WINDOWS Score: 100 89 Antivirus detection for dropped file 2->89 91 Antivirus / Scanner detection for submitted sample 2->91 93 Multi AV Scanner detection for dropped file 2->93 95 14 other signatures 2->95 14 7WOEdMm3zt.exe 10 2->14         started        18 PoLqMMhhYMLCBudEfTcyn.exe 2->18         started        20 msiexec.exe 2->20         started        process3 file4 69 C:\Users\user\AppData\Local\...\Phone GPS.exe, PE32 14->69 dropped 71 C:\Users\user\AppData\...\Phone GPS 1.exe, PE32 14->71 dropped 101 Query firmware table information (likely to detect VMs) 14->101 103 Tries to detect sandboxes and other dynamic analysis tools (window names) 14->103 105 Hides threads from debuggers 14->105 107 Tries to detect sandboxes / dynamic malware analysis system (registry check) 14->107 22 Phone GPS 1.exe 3 10 14->22         started        25 Phone GPS.exe 7 14->25         started        109 Antivirus detection for dropped file 18->109 111 Multi AV Scanner detection for dropped file 18->111 113 Machine Learning detection for dropped file 18->113 115 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 18->115 signatures5 process6 file7 59 C:\Users\user\...\qHG3WnAcYdwqQgfO4Ba4.exe, PE32 22->59 dropped 27 wscript.exe 1 22->27         started        process8 process9 29 cmd.exe 1 27->29         started        process10 31 qHG3WnAcYdwqQgfO4Ba4.exe 10 29->31         started        35 conhost.exe 29->35         started        file11 73 C:\Users\user\AppData\...\Java(TM) Server.exe, PE32 31->73 dropped 79 Multi AV Scanner detection for dropped file 31->79 37 wscript.exe 1 31->37         started        signatures12 process13 process14 39 cmd.exe 1 37->39         started        process15 41 Java(TM) Server.exe 5 13 39->41         started        45 conhost.exe 39->45         started        file16 61 C:\Users\Public\Desktop\RuntimeBroker.exe, PE32 41->61 dropped 63 C:\ProgramData\...\PoLqMMhhYMLCBudEfTcyn.exe, PE32 41->63 dropped 65 C:\ProgramData\Microsoft\...\msiexec.exe, PE32 41->65 dropped 67 2 other malicious files 41->67 dropped 97 Creates multiple autostart registry keys 41->97 99 Hides that the sample has been downloaded from the Internet (zone.identifier) 41->99 47 RuntimeBroker.exe 41->47         started        51 schtasks.exe 41->51         started        53 schtasks.exe 41->53         started        55 3 other processes 41->55 signatures17 process18 dnsIp19 75 a0516432.xsph.ru 141.8.192.26, 49718, 49723, 49729 SPRINTHOSTRU Russian Federation 47->75 77 ipinfo.io 216.239.34.21, 443, 49719 GOOGLEUS United States 47->77 81 Antivirus detection for dropped file 47->81 83 Multi AV Scanner detection for dropped file 47->83 85 Machine Learning detection for dropped file 47->85 87 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 51->87 57 conhost.exe 51->57         started        signatures20 process21
Threat name:
Win32.Downloader.Upatre
Status:
Malicious
First seen:
2021-02-27 00:56:13 UTC
AV detection:
24 of 28 (85.71%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
evasion persistence themida trojan upx
Behaviour
Creates scheduled task(s)
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
Checks whether UAC is enabled
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
themida
Executes dropped EXE
UPX packed file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Unpacked files
SH256 hash:
6517c654632c53db5bed93984728f1b5a6e63ab1e2cd36a3333750d9e4ead71f
MD5 hash:
cdc7a8acb81862e3b6d6ace3149b777d
SHA1 hash:
73ff701634463b98cf1707dfaaf2c2ecf707ae69
SH256 hash:
c659cd4d23581624c83115af279bac4b6a5644587516f10edc2a8cdc5d6e3144
MD5 hash:
17947dc94ce5cf47aa5092d02a32c082
SHA1 hash:
56f3dbf8d3f09108f8dec8b472e2f1ab3806f99e
SH256 hash:
1819bab5b4124e7dc6d6ef8c584b33b6d98c7c500fa693bc1070bbd7ad27bfcb
MD5 hash:
636afa56b233d2044d53cc1eac5fa7ad
SHA1 hash:
7c47bf9e786839de57aadf5356394137bf02346b
SH256 hash:
bf375d5c15abb5c57b0cc3371a3537b79560fe82b1aff486afde752e05971ebb
MD5 hash:
46008207efa9377a202c5c113f5b2cd5
SHA1 hash:
973969a79a40b1ebb3010189cc9f5441ac90a218
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_Themida
Author:ditekSHen
Description:Detects executables packed with Themida

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments