MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c2b9f3b84e3e990e2c225e05ea65e7a3aaaf5a688864d0ee68ed2eece557fac0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Nefilim


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: c2b9f3b84e3e990e2c225e05ea65e7a3aaaf5a688864d0ee68ed2eece557fac0
SHA3-384 hash: a165257c26be3b35677bde8ace0e10eb67fcbc31469c9178688b4fd37458ab09a4118374dbd509f73afc391e5b9e8936
SHA1 hash: 2a044e5e3dde62ded6a3f2a5a634067168a41810
MD5 hash: 5235242923a537b58b7064082dad7432
humanhash: sweet-north-uncle-south
File name:c2b9f3b84e3e990e2c225e05ea65e7a3aaaf5a688864d0ee68ed2eece557fac0.bin
Download: download sample
Signature Nefilim
File size:3'133'728 bytes
First seen:2020-07-15 10:26:37 UTC
Last seen:2020-07-15 11:41:34 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 96c44fa1eee2c4e9b9e77d7bf42d59e6 (4 x Hive, 4 x CobaltStrike, 3 x Snake)
ssdeep 24576:imdKJ8yrzh+UVe6lgA6qgIFiSzsoG9xbAW0bUXo2xdQS3adOqL1UrSlcbHLWcR4u:ndK5+Uz+qxMSIoG9x09gdQS3ajibLw
Threatray 67 similar samples on MalwareBazaar
TLSH 31E53A07EED658E3D7F9F27149B257627772B068073277C31E548A7D190ABA42E2E308
Reporter JAMESWT_WT
Tags:go Nefilim Ransomware signed

Code Signing Certificate

Organisation:DES SP Z O O
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:Jul 12 00:00:00 2020 GMT
Valid to:Jul 12 23:59:59 2021 GMT
Serial number: C04F5D17AF872CB2C37E3367FE761D0D
Intelligence: 3 malware samples on MalwareBazaar are signed with this code signing certificate
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: 7F52ECE50576FCC7D66E028ECEC89D3FAEDEEEDB953935E215AAC4215C9F4D63
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
1'945
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Changing a file
Modifying an executable file
Creating a file in the mass storage device
Threat name:
Win64.Trojan.Zudochka
Status:
Malicious
First seen:
2020-07-15 10:28:08 UTC
File Type:
PE+ (Exe)
AV detection:
32 of 48 (66.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
JavaScript code in executable
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments