MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cb17f05722fdf539b6675a082e193e5e29957c41dfd8bf114895c8278389162d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: cb17f05722fdf539b6675a082e193e5e29957c41dfd8bf114895c8278389162d
SHA3-384 hash: 690e5dc6435bf703e3b17ed405b0c687e09deb262d7ee7f00ff6c761f0666a65144913d1eca964251e7443664aabc098
SHA1 hash: 9389d20935ae2b5eae73ad08d57940476a24588a
MD5 hash: 667b2a9ff17bb2184e3788a91aac944e
humanhash: item-steak-cola-alaska
File name:nggVa.exe
Download: download sample
File size:20'480 bytes
First seen:2020-07-07 17:04:55 UTC
Last seen:2020-07-07 17:59:34 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'750 x AgentTesla, 19'656 x Formbook, 12'248 x SnakeKeylogger)
ssdeep 384:xW+XimUFNGQbxM4FTiPx5HYeqbrXF1ba/OMBDZKnuWrVZEBL:xW+SxSQbC4FTizHHqN1bZMBDZKnzrVCL
Threatray 55 similar samples on MalwareBazaar
TLSH C592D734B3D5472AE4BB477A9AB5C391CB32718A8212E39F49C550D68E637810F137AB
Reporter James_inthe_box
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
77
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Sending a custom TCP request
Creating a file in the Windows subdirectories
Sending an HTTP GET request
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Malicious
First seen:
2020-07-07 17:04:42 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of AdjustPrivilegeToken
Modifies system certificate store
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments