MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ca5837c6b4cdde0e3ef9942ba308ca19e9b51439048bd0c2fcf5753e1403a517. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 31 File information Comments

SHA256 hash: ca5837c6b4cdde0e3ef9942ba308ca19e9b51439048bd0c2fcf5753e1403a517
SHA3-384 hash: b128443076e7a705d39c6fbb33e37594e3d25302ff624e4a778650ff26cad533ecd882e2ff588946c3581b19f772ac7d
SHA1 hash: b71f9a2ad0bd245ab4d4666f005cd5050f7f2770
MD5 hash: 783597870319e8fc1c818c5f13e28a0d
humanhash: skylark-ack-vermont-uniform
File name:175397281826.zip
Download: download sample
File size:2'685'679 bytes
First seen:2022-11-05 11:40:50 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 49152:gCkbPBzS7ULCbGyDboE8wrupidLNDNVeC1T5nY5tHfswXNWoUr3EHDMYCpsmiP7:gpDBzS7UL+G3q5V7y5JB9WBUHIYCpsT7
TLSH T1F9C533A81E5D82E3A9660F3FD9823E732A89186B92532D4D457131C8048BFBD7D674F3
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter Anonymous
Tags:zip


Avatar
Anonymous
Retrieved from hxxp://95[.]217[.]245[.]254/175397281826.zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
65
Origin country :
HU HU
File Archive Information

This file archive contains 10 file(s), sorted by their relevance:

File name:mozglue.dll
File size:608'080 bytes
SHA256 hash: ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
MD5 hash: c8fd9be83bc728cc04beffafc2907fe9
MIME type:application/x-dosexec
File name:freebl3.dll
File size:685'392 bytes
SHA256 hash: edd043f2005dbd5902fc421eabb9472a7266950c5cbaca34e2d590b17d12f5fa
MD5 hash: 550686c0ee48c386dfcb40199bd076ac
MIME type:application/x-dosexec
File name:vcruntime140.dll
File size:80'880 bytes
SHA256 hash: 8934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
MD5 hash: a37ee36b536409056a86f50e67777dd7
MIME type:application/x-dosexec
File name:nss3.dll
File size:2'046'288 bytes
SHA256 hash: ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
MD5 hash: 1cc453cdf74f31e4d913ff9c10acdde2
MIME type:application/x-dosexec
File name:sqlite3.dll
File size:1'106'998 bytes
SHA256 hash: 4841020c8bd06b08fde6e44cbe2e2ab33439e1c8368e936ec5b00dc0584f7260
MD5 hash: 1f44d4d3087c2b202cf9c90ee9d04b0f
MIME type:application/x-dosexec
File name:msvcp140.dll
File size:450'024 bytes
SHA256 hash: 5136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062
MD5 hash: 5ff1fca37c466d6723ec67be93b51442
MIME type:application/x-dosexec
File name:softokn3.dll
File size:257'872 bytes
SHA256 hash: 74ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a
MD5 hash: 4e52d739c324db8225bd9ab2695f262f
MIME type:application/x-dosexec
File name:32
File size:488 bytes
SHA256 hash: fc86b4c01b7de0f81348f47113c710b32bb53053097b9c0b09dd32b57aeff746
MD5 hash: cb588801d051eb8cf137d9e6403f289c
MIME type:text/xml
File name:64
File size:435 bytes
SHA256 hash: 0675103f0fb7508d4ac8ce2af2e94924012a4129278270ab6a785790c61ccfc9
MD5 hash: 385e807f870cd0eb6f78b168e9604ed4
MIME type:text/xml
File name:2
File size:248 bytes
SHA256 hash: 85b4d563f7bd63022c0ac0d853ddefcaea477797a36f5ed894d3dc4cb97595fd
MD5 hash: aa35bf7a95701647e02ce851116c1de2
MIME type:text/xml
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug anti-vm overlay spyeye
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Binary.Trojan.Generic
Status:
Suspicious
First seen:
2022-09-12 12:44:11 UTC
File Type:
Binary (Archive)
Extracted files:
10
AV detection:
3 of 42 (7.14%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:Check_OutputDebugStringA_iat
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:RansomPyShield_Antiransomware
Author:XiAnzheng
Description:Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP)
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

zip ca5837c6b4cdde0e3ef9942ba308ca19e9b51439048bd0c2fcf5753e1403a517

(this sample)

Comments