MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c408659f786e17b2cbb5a2668ce4923a70a6c59e7320df0c3c206a4ba5c17989. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 4
| SHA256 hash: | c408659f786e17b2cbb5a2668ce4923a70a6c59e7320df0c3c206a4ba5c17989 |
|---|---|
| SHA3-384 hash: | f55977f9d0a133b574fa71fa7c8064b377433031f67625d1f989ed739a58539165b63b88332f755ec2ce9a9939402cf7 |
| SHA1 hash: | ea4edc1af6ff4c8dddc524b5e546ab37b304d8f8 |
| MD5 hash: | 31f97b7fa2f4924fc1c8633607128fc7 |
| humanhash: | maryland-lion-august-oven |
| File name: | scr.bin |
| Download: | download sample |
| File size: | 225'792 bytes |
| First seen: | 2020-10-02 07:25:06 UTC |
| Last seen: | 2020-10-02 07:54:50 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 9ddf37e7dcee5085c2e6d85a767fc408 |
| ssdeep | 6144:kJ+tS+mjd7W1GO3xwaxLFw1oanMUoJ23Dz/bEB:Tc+kd7W1pxQogXbEB |
| Threatray | 1 similar samples on MalwareBazaar |
| TLSH | 60247E11F2C20876D1631F78BC2BB25D5A3AFF552E29654BA6F94D0C8D3E3817C186E2 |
| Reporter | |
| Tags: | Amadey |
Intelligence
File Origin
# of uploads :
2
# of downloads :
781
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Result
Verdict:
Clean
Maliciousness:
Behaviour
Sending a UDP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
68 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Posts data to a JPG file (protocol mismatch)
System process connects to network (likely due to code injection or exploit)
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Plodor
Status:
Malicious
First seen:
2020-05-05 19:53:00 UTC
File Type:
PE (Dll)
AV detection:
35 of 48 (72.92%)
Threat level:
5/5
Verdict:
unknown
Similar samples:
Result
Malware family:
n/a
Score:
8/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Blacklisted process makes network request
Unpacked files
SH256 hash:
c408659f786e17b2cbb5a2668ce4923a70a6c59e7320df0c3c206a4ba5c17989
MD5 hash:
31f97b7fa2f4924fc1c8633607128fc7
SHA1 hash:
ea4edc1af6ff4c8dddc524b5e546ab37b304d8f8
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Tinba
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
dll c408659f786e17b2cbb5a2668ce4923a70a6c59e7320df0c3c206a4ba5c17989
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.