MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ca24347d80aed81df2a0e89075c645bfd6081a8e66103ea680f3a8758999b32b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Patchwork


Vendor detections: 9


Intelligence 9 IOCs YARA 3 File information Comments

SHA256 hash: ca24347d80aed81df2a0e89075c645bfd6081a8e66103ea680f3a8758999b32b
SHA3-384 hash: e74f4bfae0b1e42b4c10a1f18af6a116ca91743f8264b9938732bc3f4de05e02b9ea46c0b832f3399c1ebe4b77397b70
SHA1 hash: bf239a1aa2e212d789e2b00f4133d6c000880d6b
MD5 hash: eecee405c8c2536778131ba44dfb3987
humanhash: four-india-one-chicken
File name:Services.exe
Download: download sample
Signature Patchwork
File size:217'600 bytes
First seen:2023-12-07 09:39:00 UTC
Last seen:2023-12-07 11:18:12 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7628b906ff5db8fbac0de120f710f757 (1 x Patchwork)
ssdeep 6144:vTNB6gE2FlcgHfaeGrHpMrDVpHB8Keb6:vZZEwFalrJeDT0
TLSH T1B4248D26F2425CFDC06BC0B4825A5532B5727CC81B35BEFF06946236AE76AE47E3C644
TrID 44.4% (.EXE) Win64 Executable (generic) (10523/12/4)
21.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.ICL) Windows Icons Library (generic) (2059/9)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter smica83
Tags:apt exe Patchwork

Intelligence


File Origin
# of uploads :
2
# of downloads :
380
Origin country :
HU HU
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Сreating synchronization primitives
Running batch commands
Launching a process
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
89%
Tags:
anti-debug donut monero packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.spyw
Score:
64 / 100
Signature
Contains functionality to capture screen (.Net source)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Uses nslookup.exe to query domains
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1355296 Sample: Services.exe Startdate: 07/12/2023 Architecture: WINDOWS Score: 64 29 wingpao.info 2->29 31 resolver1.opendns.com 2->31 35 Malicious sample detected (through community Yara rule) 2->35 37 Multi AV Scanner detection for submitted file 2->37 39 Contains functionality to capture screen (.Net source) 2->39 8 Services.exe 14 2 2->8         started        signatures3 process4 dnsIp5 33 wingpao.info 185.74.222.34, 443, 49708, 49710 CDNETDemosTelecomLLCRU Russian Federation 8->33 11 cmd.exe 1 8->11         started        14 cmd.exe 1 8->14         started        process6 signatures7 41 Uses nslookup.exe to query domains 11->41 16 nslookup.exe 1 11->16         started        19 conhost.exe 11->19         started        21 WMIC.exe 1 14->21         started        23 conhost.exe 14->23         started        process8 dnsIp9 25 222.222.67.208.in-addr.arpa 16->25 27 myip.opendns.com 16->27
Threat name:
Win64.Spyware.Rustystealer
Status:
Malicious
First seen:
2023-12-07 04:15:56 UTC
File Type:
PE+ (Exe)
AV detection:
18 of 23 (78.26%)
Threat level:
  2/5
Verdict:
unknown
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Unexpected DNS network traffic destination
Unpacked files
SH256 hash:
ca24347d80aed81df2a0e89075c645bfd6081a8e66103ea680f3a8758999b32b
MD5 hash:
eecee405c8c2536778131ba44dfb3987
SHA1 hash:
bf239a1aa2e212d789e2b00f4133d6c000880d6b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Rustyloader_mem_loose
Author:James_inthe_box
Description:Corroded buerloader
Reference:https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments