MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bfe85700c95ee65a50c47769f003c792d9b7cc407359a6d6df795c3bbb3fef8b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Adware.Generic


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments 1

SHA256 hash: bfe85700c95ee65a50c47769f003c792d9b7cc407359a6d6df795c3bbb3fef8b
SHA3-384 hash: 576f1cfe3292a8529b767b55fc9b6ac86b0bc490985a0cf7bcd799ce12c2147b9fab91d565cbae0014db68b6a9ab8692
SHA1 hash: ed7824bee1b817104b5555391b8763abee9636cf
MD5 hash: 4b921412e7a61d828cb6b78726747c5e
humanhash: comet-connecticut-red-carolina
File name:4b921412e7a61d828cb6b78726747c5e
Download: download sample
Signature Adware.Generic
File size:16'251'554 bytes
First seen:2023-06-08 03:46:55 UTC
Last seen:2023-06-08 07:28:12 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f5151e63f951542420f03e2fa50c82d8 (1 x Adware.Generic)
ssdeep 393216:9S9Q6sx8CfDNhWJ36Yt/MENAzN7pHlY2/E3oXtrP:9S98NBkBt/fYdHl1IU5
Threatray 40 similar samples on MalwareBazaar
TLSH T1B9F633623B59CC98E2B1C4F8297D4F84F87D89661D5785F8DBE68CE114B8EB8748F006
TrID 42.7% (.EXE) Win32 Executable (generic) (4505/5/1)
19.2% (.EXE) OS/2 Executable (generic) (2029/13)
19.0% (.EXE) Generic Win/DOS Executable (2002/3)
18.9% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon 9270e894d4cc6992 (1 x Adware.Generic)
Reporter zbetcheckin
Tags:32 Adware.Generic exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
333
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
4b921412e7a61d828cb6b78726747c5e
Verdict:
Malicious activity
Analysis date:
2023-06-08 03:47:27 UTC
Tags:
trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware lolbin overlay packed packed shell32.dll
Result
Verdict:
MALICIOUS
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
76 / 100
Signature
Antivirus / Scanner detection for submitted sample
Connects to many ports of the same IP (likely port scanning)
Detected VMProtect packer
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect virtualization through RDTSC time measurements
Behaviour
Behavior Graph:
Threat name:
Win32.Packed.VMProtect
Status:
Malicious
First seen:
2023-06-08 03:47:08 UTC
File Type:
PE (Exe)
Extracted files:
28
AV detection:
20 of 24 (83.33%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
bootkit persistence upx vmprotect
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Writes to the Master Boot Record (MBR)
UPX packed file
VMProtect packed file
Unpacked files
SH256 hash:
bfe85700c95ee65a50c47769f003c792d9b7cc407359a6d6df795c3bbb3fef8b
MD5 hash:
4b921412e7a61d828cb6b78726747c5e
SHA1 hash:
ed7824bee1b817104b5555391b8763abee9636cf
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_VMProtect
Author:ditekSHen
Description:Detects executables packed with VMProtect.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Adware.Generic

Executable exe bfe85700c95ee65a50c47769f003c792d9b7cc407359a6d6df795c3bbb3fef8b

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-06-08 03:46:56 UTC

url : hxxp://43.139.13.79:8186/%E4%BF%A1%E5%A4%A9%E6%B8%B8.exe