MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c8ab8270cec2c671e2414b40df4bec673f7aadee70f6b7012033c8a215064b72. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: c8ab8270cec2c671e2414b40df4bec673f7aadee70f6b7012033c8a215064b72
SHA3-384 hash: ee00c0d96bdadd5d21f27fbfca7d1606effbbbeeb553bf7eb38e6a57ef42ac75eb7a44fb9b7277e071b73b89bffa4a97
SHA1 hash: cf542fb819084076b40dadbcd1f2751e227e7e64
MD5 hash: 01a6067cf4dc06c54057905981c57709
humanhash: colorado-quiet-early-georgia
File name:c8ab8270cec2c671e2414b40df4bec673f7aadee70f6b7012033c8a215064b72
Download: download sample
File size:166'323 bytes
First seen:2020-11-07 19:00:37 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5f116d8e20f7d894b4b4ecbad1704009 (2 x SpyEye, 1 x DarkComet, 1 x Worm.Soulclose)
ssdeep 3072:9fpxtr+tsm1s8sM0ptAnG1BzwD8Wuqs8tSzQtSsbe/JF:tpxZmG8sDu48wtF8KQzAL
Threatray 3'513 similar samples on MalwareBazaar
TLSH 02F30225B338DF12EC4C8D32B46DAD489194FF464F384E6572E8B5C3E9B46811A2363B
Reporter seifreed

Intelligence


File Origin
# of uploads :
1
# of downloads :
53
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the Windows subdirectories
Creating a file in the Windows directory
Creating a process from a recently created file
Creating a process with a hidden window
Enabling the 'hidden' option for recently created files
Searching for the window
Launching a process
Using the Windows Management Instrumentation requests
Forced system process termination
Loading a driver
Loading a system driver
Launching a service
Creating a service
Changing a file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Changing the Windows explorer settings
Blocking a possibility to launch for the Windows registry editor (regedit.exe)
Changing the Windows explorer settings to hide files extension
Blocking a possibility to launch for the Windows Task Manager (taskmgr)
Creating a file in the mass storage device
Forced shutdown of a system process
Enabling autorun for a service
Enabling autorun
Enabling a "Do not show hidden files" option
Forced shutdown of a browser
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion persistence spyware upx
Behaviour
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Adds Run key to start application
Reads user/profile data of web browsers
Adds policy Run key to start application
Disables RegEdit via registry modification
Disables Task Manager via registry modification
Executes dropped EXE
Sets file execution options in registry
UPX packed file
Modifies visibility of file extensions in Explorer
Modifies visiblity of hidden/system files in Explorer
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments