MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bf4824a776c5dfcc7f11732e6595ad84c56ad67f3918f9a3bf2c285cbc6d034c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Metasploit


Vendor detections: 12


Intelligence 12 IOCs YARA 4 File information Comments

SHA256 hash: bf4824a776c5dfcc7f11732e6595ad84c56ad67f3918f9a3bf2c285cbc6d034c
SHA3-384 hash: 92287263adb2efcb541a85654a4c07d423b1d1252e4392430cec11dc39b577750d303174c3471a1dd2b047959c68bff8
SHA1 hash: 394f75c386740732ac99686f41935d210d397dfd
MD5 hash: 2b333cd461c15d29e2e15994134c0e19
humanhash: steak-vegan-louisiana-lima
File name:bf4824a776c5dfcc7f11732e6595ad84c56ad67f3918f9a3bf2c285cbc6d034c
Download: download sample
Signature Metasploit
File size:13'977'600 bytes
First seen:2024-01-24 15:35:10 UTC
Last seen:2024-01-24 17:36:46 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 027ea80e8125c6dda271246922d4c3b0 (10 x njrat, 7 x DCRat, 5 x DarkComet)
ssdeep 393216:5WSk9gq8PUlzNGRBSdP1Hilqyj/R0Zf2HrgCZ:bk9MPANGLSdP1HsqybR0V2cC
TLSH T1C8E633512786C763CDF458305C78A2E6B57CAEE85F29F4866E607E2BF4363821356233
TrID 82.2% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
9.6% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
3.2% (.EXE) Win64 Executable (generic) (10523/12/4)
1.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.3% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 8e3169694949718e (3 x Stealc, 2 x Pikabot, 1 x RecordBreaker)
Reporter JaffaCakes118
Tags:exe Metasploit

Intelligence


File Origin
# of uploads :
2
# of downloads :
373
Origin country :
RO RO
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a file
Creating a file in the Program Files subdirectories
Modifying a system file
Using the Windows Management Instrumentation requests
Creating a service
Launching a service
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Launching a process
Enabling autorun for a service
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
fingerprint lolbin packed setupapi shdocvw shell32 swrort
Result
Verdict:
MALICIOUS
Result
Threat name:
Metasploit
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive battery information (via WMI, Win32_Battery, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Yara detected Metasploit Payload
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1380464 Sample: yWppHaHF83.exe Startdate: 24/01/2024 Architecture: WINDOWS Score: 96 87 Found malware configuration 2->87 89 Malicious sample detected (through community Yara rule) 2->89 91 Multi AV Scanner detection for submitted file 2->91 93 7 other signatures 2->93 9 yWppHaHF83.exe 22 2->9         started        13 ProductAgentService.exe 2->13         started        15 bdredline.exe 2->15         started        17 svchost.exe 2->17         started        process3 dnsIp4 73 18.228.115.60 AMAZON-02US United States 9->73 63 C:\Users\user\AppData\...\setuppackage.exe, PE32 9->63 dropped 65 C:\Users\user\AppData\...\agentpackage.exe, PE32 9->65 dropped 67 C:\Users\user\AppData\Local\...\deploy.dll, PE32 9->67 dropped 71 2 other files (none is malicious) 9->71 dropped 19 agent_launcher.exe 1 9->19         started        75 34.120.85.253 GOOGLEUS United States 13->75 77 35.190.56.82 GOOGLEUS United States 13->77 85 5 other IPs or domains 13->85 69 C:\Windows\Temp\bd_5E93.tmp\ybg5E94.tmp, PE32 13->69 dropped 21 DiscoverySrv.exe 13->21         started        23 DiscoverySrv.exe 13->23         started        25 ProductAgentService.exe 13->25         started        27 ProductAgentUI.exe 13->27         started        79 104.18.168.222 CLOUDFLARENETUS United States 15->79 81 127.0.0.1 unknown unknown 15->81 83 184.31.50.93 AKAMAI-ASUS United States 17->83 file5 process6 process7 29 bddeploy.exe 2 19->29         started        31 regsvr32.exe 21->31         started        process8 33 installer.exe 61 301 29->33         started        37 setuppackage.exe 48 29->37         started        file9 47 C:\Program Files\...\ProductAgentService.exe, PE32 33->47 dropped 49 C:\Program Files\...\bdreinit.exe, PE32 33->49 dropped 51 C:\Program Files\...\bdredline.exe, PE32 33->51 dropped 59 37 other files (none is malicious) 33->59 dropped 95 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 33->95 97 Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes) 33->97 39 ProductAgentService.exe 33->39         started        41 ProductAgentService.exe 33->41         started        43 ProductAgentService.exe 33->43         started        45 ProductAgentService.exe 33->45         started        53 C:\Users\user\AppData\Local\...\installer.exe, PE32 37->53 dropped 55 C:\Users\user\AppData\Local\...\unrar.dll, PE32 37->55 dropped 57 C:\Users\user\AppData\Local\...\sciter.dll, PE32 37->57 dropped 61 6 other files (none is malicious) 37->61 dropped signatures10 process11
Threat name:
Win32.Trojan.Swrort
Status:
Malicious
First seen:
2023-10-28 20:02:53 UTC
File Type:
PE (Exe)
Extracted files:
36
AV detection:
16 of 38 (42.11%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
metasploit
Score:
  10/10
Tags:
family:metasploit backdoor discovery trojan
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Downloads MZ/PE file
MetaSploit
Malware Config
C2 Extraction:
18.228.115.60:15432
Unpacked files
SH256 hash:
a29cea2ab392aad8554d442a4385961a1d519d3ea44753efd7bf8a15c2e25049
MD5 hash:
84945692207cf5b683a67a85489493ae
SHA1 hash:
16dd64ac3a4d92a2381523724dd43638fd49ad4c
SH256 hash:
075dba03cf09c8f238895c1d7aeedcf23ae74a64e72be41794c67c91d4414467
MD5 hash:
0b61707cee853bb313c888c38461d0ee
SHA1 hash:
6c73ab5cd569a8ee3c3177945a061001157236c4
SH256 hash:
4f601852736a15628d798fa70b522d377622420c3875768becd2efd888fe305b
MD5 hash:
09b30eb99b4c041681c1ae9c2d204afc
SHA1 hash:
aeeceafa11086d0b326b5d5e64814992844b7ada
SH256 hash:
22ae73c1397e1c5a9fdab563a067f8350e6dc1cadc44b428a51c53d8f5f2bfd3
MD5 hash:
9b51f64a17d0bb1e4ac7513f3f120dcb
SHA1 hash:
957a9709dcc21b215c8dc5c08a83b0fa158c51e5
SH256 hash:
54462d2fd7148388bf4a16b0a274f6575078351bd9c928037d1274767eaa14e5
MD5 hash:
5648699343ab50e163f99323048595d8
SHA1 hash:
231cff6d9cf987f3919bc60b4b795e3bbf7f7ad9
SH256 hash:
bf4824a776c5dfcc7f11732e6595ad84c56ad67f3918f9a3bf2c285cbc6d034c
MD5 hash:
2b333cd461c15d29e2e15994134c0e19
SHA1 hash:
394f75c386740732ac99686f41935d210d397dfd
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Metasploit

Executable exe bf4824a776c5dfcc7f11732e6595ad84c56ad67f3918f9a3bf2c285cbc6d034c

(this sample)

  
Delivery method
Distributed via web download

Comments