MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c4b40854b0d96e0967c64ee0f80d41222d57029ec9e3e4b72f4232291879caad. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: c4b40854b0d96e0967c64ee0f80d41222d57029ec9e3e4b72f4232291879caad
SHA3-384 hash: aa502b5b2ab76d4424bcef79bb61b547f7705f6cec38924626f5d238925f6fdf1c547e73a6fc6f67c758c6c3f689b8df
SHA1 hash: 18cad4a5fb54a263898974a0346100d128e5e8a0
MD5 hash: 6e45d3fdb598634ad074e2006edb03bc
humanhash: carpet-network-november-kentucky
File name:c4b40854b0d96e0967c64ee0f80d41222d57029ec9e3e4b72f4232291879caad
Download: download sample
File size:1'551'643 bytes
First seen:2020-06-10 07:33:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 24576:PAOcZXsWtuGcv4MBsRm609ekx6jARJZOckDgBQmPN51lrlGSrNObuVqf1972mSjQ:BliuYm6cvmARJDDF51HvMb4qt972hjwp
Threatray 249 similar samples on MalwareBazaar
TLSH B8752302BBCA88B2D0731E326D3B6B196E7978101E259B1FB3D05DACDA755816131FB3
Reporter JAMESWT_WT

Intelligence


File Origin
# of uploads :
1
# of downloads :
56
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Backdoor.Bladabhindi
Status:
Malicious
First seen:
2020-06-04 13:57:10 UTC
File Type:
PE (Exe)
Extracted files:
42
AV detection:
25 of 31 (80.65%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
agilenet
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Loads dropped DLL
Obfuscated with Agile.Net obfuscator
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments