MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c98cb5ef26c659b30d3fc26fa45b27595337d83c32405d9298d799a975b736fb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 8
| SHA256 hash: | c98cb5ef26c659b30d3fc26fa45b27595337d83c32405d9298d799a975b736fb |
|---|---|
| SHA3-384 hash: | 311f1d325d66a01cec37c4fbcfa9ed95f5ee6a3ab7f665443be78d7f011db81a1297f57ebb889b7fb0c2a13798441579 |
| SHA1 hash: | fc9f42ea2d0f738d6a3ee4952551a785f6bbac51 |
| MD5 hash: | ce977f0eaaaba80afc05abb7e1832269 |
| humanhash: | beryllium-california-eleven-kentucky |
| File name: | ce977f0eaaaba80afc05abb7e1832269 |
| Download: | download sample |
| File size: | 355'840 bytes |
| First seen: | 2021-08-11 21:37:28 UTC |
| Last seen: | 2021-08-11 22:46:02 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | aa13d15d6dd2e094d4aa7be42a7367ea (5 x RaccoonStealer, 1 x DanaBot) |
| ssdeep | 6144:dl1Mg/IZB2z4/3bvdLgrVejXPNIUi9rm7knGyHM:dbMg/Iy4/3zNFIUOmI |
| Threatray | 6 similar samples on MalwareBazaar |
| TLSH | T10E74F1127E7CCE32C49506714436C7B8697FAC90BE25414B3B983BAFEE713921676389 |
| dhash icon | e084f2e82cf8d0a6 |
| Reporter | |
| Tags: | 32 exe |
Intelligence
File Origin
# of uploads :
2
# of downloads :
110
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ce977f0eaaaba80afc05abb7e1832269
Verdict:
Suspicious activity
Analysis date:
2021-08-11 21:39:03 UTC
Tags:
installer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Running batch commands
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Searching for the window
Sending a UDP request
Launching a tool to kill processes
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
68 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Fragtor
Status:
Malicious
First seen:
2021-08-11 19:37:45 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
5/5
Verdict:
unknown
Similar samples:
Result
Malware family:
n/a
Score:
7/10
Tags:
n/a
Behaviour
Kills process with taskkill
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Deletes itself
Unpacked files
SH256 hash:
8aa4b35b358613c750fc60d80b2d46356622997975afbe56a0663b566b259635
MD5 hash:
1d950ea757becd94bd8fafbda076d838
SHA1 hash:
a3cd530992fce3f67c27eba96b59976772f47877
SH256 hash:
c98cb5ef26c659b30d3fc26fa45b27595337d83c32405d9298d799a975b736fb
MD5 hash:
ce977f0eaaaba80afc05abb7e1832269
SHA1 hash:
fc9f42ea2d0f738d6a3ee4952551a785f6bbac51
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
exe c98cb5ef26c659b30d3fc26fa45b27595337d83c32405d9298d799a975b736fb
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://37.0.11.8/WW/ner.exe