MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c275c00ed3831518a88e99ffae3737126da1dd4ef018028850e9b742263e98d9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Hive


Vendor detections: 6


Intelligence 6 IOCs YARA 9 File information Comments

SHA256 hash: c275c00ed3831518a88e99ffae3737126da1dd4ef018028850e9b742263e98d9
SHA3-384 hash: 098197ea38394f359c24577270d3c74f6951554c2cd941e54ee74cde1d4f40f825af0e8c026ff4bf79a3a729dd49d292
SHA1 hash: 4736630e9e0b4649b62abcf93faa8a533cf1d3d6
MD5 hash: 5d17c483194e0fbf2f197995cf84eb6f
humanhash: ceiling-yankee-eleven-beryllium
File name:64770112.exe
Download: download sample
Signature Hive
File size:2'731'008 bytes
First seen:2022-03-23 04:45:56 UTC
Last seen:2022-03-23 07:11:49 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9aebf3da4677af9275c461261e5abde3 (25 x YTStealer, 12 x CobaltStrike, 11 x Hive)
ssdeep 49152:Wk0KRXc3m0RFlcFqM1E40QAjG+f0NVzNNf3yRGIqoBSojOSob22lM8GZaKa:WknRXgm0RjMRCUAj/f0NV3f0GjDL0MzA
Threatray 72 similar samples on MalwareBazaar
TLSH T132C533BE325B5414C13897FBA62EE852151B45F6F2C87D466BE938C20072FE73A31276
Reporter adm1n_usa32
Tags:exe Hive

Intelligence


File Origin
# of uploads :
2
# of downloads :
237
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win64.Infostealer.BroPass
Status:
Malicious
First seen:
2022-03-23 04:46:15 UTC
File Type:
PE+ (Exe)
AV detection:
16 of 26 (61.54%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Unpacked files
SH256 hash:
c275c00ed3831518a88e99ffae3737126da1dd4ef018028850e9b742263e98d9
MD5 hash:
5d17c483194e0fbf2f197995cf84eb6f
SHA1 hash:
4736630e9e0b4649b62abcf93faa8a533cf1d3d6
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:GoBinTest
Rule name:golang
Rule name:Golangmalware
Author:Dhanunjaya
Description:Malware in Golang
Rule name:grakate_stealer_nov_2021
Rule name:HiveRansomware
Author:Dhanunjaya
Description:Yara Rule To Detect Hive V4 Ransomware
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:methodology_golang_build_strings
Author:smiller
Description:Looks for PEs with a Golang build ID

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments