MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c7962bac550ffe20ff69bbcecea355ea9689fa1e76506d3d8343f1b1f5619706. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 4
| SHA256 hash: | c7962bac550ffe20ff69bbcecea355ea9689fa1e76506d3d8343f1b1f5619706 |
|---|---|
| SHA3-384 hash: | 536c4c6e2a6e33aa960fa8058d3e91682dd487d0cc74c2d62628427af346e1c0ce1b2d367d717218e0d5703898d4272d |
| SHA1 hash: | c5ea5dcb264701a5d9f9313eac4896913aff5b46 |
| MD5 hash: | 6781bcd642bc0323b4ca6a5228812f10 |
| humanhash: | gee-delaware-mississippi-maryland |
| File name: | Ficha OMS - Reserva Medicos.exe |
| Download: | download sample |
| File size: | 720'366 bytes |
| First seen: | 2020-06-18 12:49:01 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 00be6e6c4f9e287672c8301b72bdabf3 (116 x RedLineStealer, 70 x AsyncRAT, 55 x AgentTesla) |
| ssdeep | 6144:e/fAhvV6B8ErzPZp5wdz753RSjpPBUHByxSln8Wgoy:efAv6B8azBwd+pPeHByxSlnZgoy |
| Threatray | 263 similar samples on MalwareBazaar |
| TLSH | E4E43802AD8EC0A1D2211537D825F6FA362D6D270BF0B9CB77907F2BB5318C256B5B52 |
| Reporter | |
| Tags: | exe |
abuse_ch
Malspam distributing unidentified malware:HELO: smtp-vm-badsender.pro-smtp.fr
Sending IP: 217.171.20.84
From: <bestcoreservations@outlook.com>
Subject: SolicitaƧao de Reserva
Attachment: Ficha OMS - Reserva Medicos.rar (contains "Ficha OMS - Reserva Medicos.exe")
Unknown payload (PowerShell):
https://www.dropbox.com/s/z577d4qayfl3roh/Nv%20bolud.txt?dl=1
Intelligence
File Origin
# of uploads :
1
# of downloads :
85
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Gathering data
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-06-18 13:36:34 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 253 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
8/10
Tags:
evasion spyware trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Suspicious use of AdjustPrivilegeToken
An obfuscated cmd.exe command-line is typically used to evade detection.
Modifies system certificate store
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
exe c7962bac550ffe20ff69bbcecea355ea9689fa1e76506d3d8343f1b1f5619706
(this sample)
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.