MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cb56bffb224d9bcff0753d58995c25f6f944bcb075560019cd87283e3b443aa3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: cb56bffb224d9bcff0753d58995c25f6f944bcb075560019cd87283e3b443aa3
SHA3-384 hash: 2d7dff100c6688c268f4787d63d4e36058547cc79a0c3b14c16d3dc5f16e0894135bf5af12988b2a0fca2a809be99ed2
SHA1 hash: 0b6226071ab1711bbbfaca2cdad6783d2658d797
MD5 hash: 12c26ab43202d2ef17553eeb17376c2a
humanhash: twelve-winner-minnesota-robert
File name:12c26ab43202d2ef17553eeb17376c2a.exe
Download: download sample
File size:653'833 bytes
First seen:2023-10-11 06:36:21 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'507 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 12288:RQi9zSYMvrOK9BOKjHol+yFnWVOjTPlxsU807BN/9+FJeyuAJMX7QYQ:RQiE7eORaEOjRxsUrLUoJi
Threatray 38 similar samples on MalwareBazaar
TLSH T1D3D40109A99590B6D0713BF07A48D0605527BE482E208505B1FC7E9F3B7E583EE4A7BF
TrID 70.2% (.EXE) Inno Setup installer (109740/4/30)
9.0% (.EXE) Win32 Executable Delphi generic (14182/79/4)
8.3% (.SCR) Windows screen saver (13097/50/3)
4.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
2.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 1e2de5665662258f
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
299
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
DuckDnsInst.exe
Verdict:
Suspicious activity
Analysis date:
2022-02-21 17:32:13 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
DNS request
Gathering data
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
ETX Software Inc.
Verdict:
Unknown
Result
Threat name:
n/a
Detection:
clean
Classification:
n/a
Score:
5 / 100
Behaviour
Behavior Graph:
n/a
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Executes dropped EXE
Loads dropped DLL
Unpacked files
SH256 hash:
cafb7d762f142cb5905a9e4e2660cb8b82b932eee18c087e941a9f7ece4d5cca
MD5 hash:
65d7dcc8fc52dd28d71f325faafe1589
SHA1 hash:
b0efdf0cd939c99f920ad3afcae4bfafd9e0bced
SH256 hash:
0d6b20f6c388c9ea466d566cbd161519072f87b60b2433e1122b6a41743db53c
MD5 hash:
5f77c94f83f2ed93479132584c27a066
SHA1 hash:
d02e8a84aa714de1786d60473dc3e41c7e71994c
SH256 hash:
cb56bffb224d9bcff0753d58995c25f6f944bcb075560019cd87283e3b443aa3
MD5 hash:
12c26ab43202d2ef17553eeb17376c2a
SHA1 hash:
0b6226071ab1711bbbfaca2cdad6783d2658d797
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe cb56bffb224d9bcff0753d58995c25f6f944bcb075560019cd87283e3b443aa3

(this sample)

Comments