MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c4a61b581890f575ba0586cf6d7d7d3e0c7603ca40915833d6746326685282b7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: c4a61b581890f575ba0586cf6d7d7d3e0c7603ca40915833d6746326685282b7
SHA3-384 hash: 1ee77c26d7ec297bf2779defa1a81b0a7be6f5bbbb58a295ce99e032811bbc2054ec3e8b8493181f99946d8f0b0a8e28
SHA1 hash: 23e7001d1ac560e55f4a260b18a8fec8be40d840
MD5 hash: 280c8557eb45d5fee4a4663f5db5dcaf
humanhash: cold-orange-arkansas-uranus
File name:info.exe
Download: download sample
File size:468'034 bytes
First seen:2020-08-13 13:46:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 12288:2GqN/XdctpVtkZtX+t4dCASOwEtoDJ8f/h:eNcBtkZXdCX9OR
Threatray 245 similar samples on MalwareBazaar
TLSH E5A4E102B6C18972D43319325A39AB156E7D7D202F34DE2FB3E46D6DDA31180A635BB3
Reporter abuse_ch
Tags:exe


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: se4p-iad1.servconfig.com
Sending IP: 199.250.217.29
From: o.abukishek@trustlogistic.jo
Subject: Report from 5470142
Attachment: info.rar (contains "info.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
73
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Sending a UDP request
Unauthorized injection to a recently created process
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
n/a
Score:
22 / 100
Signature
a
B
c
e
i
m
n
o
p
r
s
t
u
y
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 265877 Sample: info.exe Startdate: 14/08/2020 Architecture: WINDOWS Score: 22 31 Binary contains a suspicious time stamp 2->31 6 info.exe 10 2->6         started        9 info.exe 10 2->9         started        11 info.exe 10 2->11         started        process3 file4 19 C:\Users\user\AppData\Local\...\gdrive.exe, PE32 6->19 dropped 21 C:\Users\user\AppData\Local\...\decrypt.exe, PE32 6->21 dropped 13 decrypt.exe 2 6->13         started        23 C:\Users\user\AppData\Local\...\gdrive.exe, PE32 9->23 dropped 25 C:\Users\user\AppData\Local\...\decrypt.exe, PE32 9->25 dropped 15 decrypt.exe 2 9->15         started        27 C:\Users\user\AppData\Local\...\gdrive.exe, PE32 11->27 dropped 29 C:\Users\user\AppData\Local\...\decrypt.exe, PE32 11->29 dropped 17 decrypt.exe 2 11->17         started        process5
Threat name:
Win32.Trojan.Ymacco
Status:
Malicious
First seen:
2020-08-13 13:48:09 UTC
AV detection:
19 of 29 (65.52%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of WriteProcessMemory
Loads dropped DLL
Executes dropped EXE
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe c4a61b581890f575ba0586cf6d7d7d3e0c7603ca40915833d6746326685282b7

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments