MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 cb849a97f4c8110a19e254f0a7fa13499ec97d9e3c9d645e6800e8bae45de989. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Blackmoon
Vendor detections: 9
| SHA256 hash: | cb849a97f4c8110a19e254f0a7fa13499ec97d9e3c9d645e6800e8bae45de989 |
|---|---|
| SHA3-384 hash: | 83bd1bc8537e2c6865303c4cb1fb33aed407d9c94d3c3350996dc1f4839b5e350dbd4df471241d00482d8a2fef255746 |
| SHA1 hash: | ddceeb5aaded81c26202aa067ea2365c13e2cd1c |
| MD5 hash: | 678db70bf938a610ef0fe0a9b5d574f2 |
| humanhash: | ink-hamper-dakota-twenty |
| File name: | CB849A97F4C8110A19E254F0A7FA13499EC97D9E3C9D645E6800E8BAE45DE989 |
| Download: | download sample |
| Signature | Blackmoon |
| File size: | 259'072 bytes |
| First seen: | 2021-02-09 15:01:53 UTC |
| Last seen: | 2021-02-09 17:13:52 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 09d0478591d4f788cb3e5ea416c25237 (4 x Worm.Mofksys, 3 x Blackmoon, 2 x Gh0stRAT) |
| ssdeep | 6144:HukrdT/buTQ8ntfgI73BZAVHgh+9Jvgtpw:5J/bqnntIA4wIJv+ |
| Threatray | 5 similar samples on MalwareBazaar |
| TLSH | CC44231216E805F6E41389BA2FD57F6CF222B79C01660B510A31294837B7B7F56A73EC |
| Reporter | |
| Tags: | Blackmoon |
Intelligence
File Origin
# of uploads :
2
# of downloads :
126
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
CB849A97F4C8110A19E254F0A7FA13499EC97D9E3C9D645E6800E8BAE45DE989
Verdict:
Malicious activity
Analysis date:
2020-10-30 07:10:22 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Launching the default Windows debugger (dwwin.exe)
Creating a file in the Windows directory
Sending a UDP request
Launching a process
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Creating a window
DNS request
Enabling the 'hidden' option for analyzed file
Sending an HTTP GET request
Changing DNS server
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
96 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Konar
Status:
Malicious
First seen:
2016-03-14 02:57:22 UTC
File Type:
PE (Exe)
Extracted files:
7
AV detection:
35 of 47 (74.47%)
Threat level:
5/5
Verdict:
malicious
Similar samples:
Result
Malware family:
n/a
Score:
8/10
Tags:
persistence upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Program crash
Drops file in Windows directory
Suspicious use of SetThreadContext
Adds Run key to start application
UPX packed file
Unpacked files
SH256 hash:
e760ec49072b9dfc828e309c881014d558cde6833291e529894ee544361625fb
MD5 hash:
be02dfb55be3c0d4a70bc462979da7df
SHA1 hash:
bc7af939517d8d623c436d76d9ab0cbb54509ff4
Detections:
win_krbanker_auto
SH256 hash:
495f31b38b87306bc7c5de00ea6ab1d292471b5ac0571e965ad3d36c403095e4
MD5 hash:
27fbb7a325a3c643144ae74dc26d8fe3
SHA1 hash:
9e9ca0e43d46aa93641a21c817c1d530ea797dd7
SH256 hash:
cb849a97f4c8110a19e254f0a7fa13499ec97d9e3c9d645e6800e8bae45de989
MD5 hash:
678db70bf938a610ef0fe0a9b5d574f2
SHA1 hash:
ddceeb5aaded81c26202aa067ea2365c13e2cd1c
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
0.98
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.