MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c7c04bcd56f282bc27f160cc80ccab73485dd3123f2efb35b9726a8528b7950f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Hive


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: c7c04bcd56f282bc27f160cc80ccab73485dd3123f2efb35b9726a8528b7950f
SHA3-384 hash: 347234a9a0e7739bc4437506fc53088539ea7736a051f9cce64310d55f4fce5b4482d04565170a6062b62c4596b0dd7d
SHA1 hash: ac1b2dbfe31488b9bb6f9104e1b33b78fbb51810
MD5 hash: 4c1bafbfe8491c9c2e5b987209f96293
humanhash: bulldog-video-asparagus-carolina
File name:c7c04bcd56f282bc27f160cc80ccab73485dd3123f2efb35b9726a8528b7950f.bin
Download: download sample
Signature Hive
File size:413'184 bytes
First seen:2022-03-28 23:16:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 40064c6eeb9f32dfc55bf2c7514305c2 (3 x Hive)
ssdeep 6144:eyD39gJVd8v1934Wx/DSnsJOWGM/gRASu8ixez+AW1LmOi/4G32:eyDta4tb/2sfSunPNmOQ32
Threatray 10 similar samples on MalwareBazaar
TLSH T19F943947F2A2A0BCC16AC0788757A573F932BC0946247E7B27D4BE312F65B50A72E705
Reporter Arkbird_SOLG
Tags:exe Hive Ransomware

Intelligence


File Origin
# of uploads :
1
# of downloads :
473
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug expand.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
52 / 100
Signature
Found API chain indicative of debugger detection
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 598761 Sample: tXGjovO8Ky.bin Startdate: 29/03/2022 Architecture: WINDOWS Score: 52 11 Multi AV Scanner detection for submitted file 2->11 6 tXGjovO8Ky.exe 1 2->6         started        process3 signatures4 13 Found API chain indicative of debugger detection 6->13 9 conhost.exe 6->9         started        process5
Threat name:
Win64.Ransomware.Hive
Status:
Malicious
First seen:
2022-03-17 03:27:31 UTC
File Type:
PE+ (Exe)
AV detection:
23 of 42 (54.76%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Unpacked files
SH256 hash:
c7c04bcd56f282bc27f160cc80ccab73485dd3123f2efb35b9726a8528b7950f
MD5 hash:
4c1bafbfe8491c9c2e5b987209f96293
SHA1 hash:
ac1b2dbfe31488b9bb6f9104e1b33b78fbb51810
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments