MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c7962bac550ffe20ff69bbcecea355ea9689fa1e76506d3d8343f1b1f5619706. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: c7962bac550ffe20ff69bbcecea355ea9689fa1e76506d3d8343f1b1f5619706
SHA3-384 hash: 536c4c6e2a6e33aa960fa8058d3e91682dd487d0cc74c2d62628427af346e1c0ce1b2d367d717218e0d5703898d4272d
SHA1 hash: c5ea5dcb264701a5d9f9313eac4896913aff5b46
MD5 hash: 6781bcd642bc0323b4ca6a5228812f10
humanhash: gee-delaware-mississippi-maryland
File name:Ficha OMS - Reserva Medicos.exe
Download: download sample
File size:720'366 bytes
First seen:2020-06-18 12:49:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 00be6e6c4f9e287672c8301b72bdabf3 (116 x RedLineStealer, 70 x AsyncRAT, 55 x AgentTesla)
ssdeep 6144:e/fAhvV6B8ErzPZp5wdz753RSjpPBUHByxSln8Wgoy:efAv6B8azBwd+pPeHByxSlnZgoy
Threatray 263 similar samples on MalwareBazaar
TLSH E4E43802AD8EC0A1D2211537D825F6FA362D6D270BF0B9CB77907F2BB5318C256B5B52
Reporter abuse_ch
Tags:exe


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: smtp-vm-badsender.pro-smtp.fr
Sending IP: 217.171.20.84
From: <bestcoreservations@outlook.com>
Subject: SolicitaƧao de Reserva
Attachment: Ficha OMS - Reserva Medicos.rar (contains "Ficha OMS - Reserva Medicos.exe")

Unknown payload (PowerShell):
https://www.dropbox.com/s/z577d4qayfl3roh/Nv%20bolud.txt?dl=1

Intelligence


File Origin
# of uploads :
1
# of downloads :
85
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Gathering data
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-06-18 13:36:34 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
evasion spyware trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Suspicious use of AdjustPrivilegeToken
An obfuscated cmd.exe command-line is typically used to evade detection.
Modifies system certificate store
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe c7962bac550ffe20ff69bbcecea355ea9689fa1e76506d3d8343f1b1f5619706

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments