MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cc002389575857c05d223e53e4eca5da8428a4ee1b13bd657d83d86a65ff2fdb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 13


Intelligence 13 IOCs YARA 8 File information Comments

SHA256 hash: cc002389575857c05d223e53e4eca5da8428a4ee1b13bd657d83d86a65ff2fdb
SHA3-384 hash: 366c47d9a32b8eab4a4d5a1d00a93fcf5c70f65be314165d665b132ed049b31005745e0d2a3861c171fbef8fbe1447b2
SHA1 hash: b4109b72e85235aa4778285f86f606d89af565e4
MD5 hash: b7ffb8cd0908bf08597ddaf1a00f01ae
humanhash: zebra-ink-early-carpet
File name:file
Download: download sample
File size:7'854'604 bytes
First seen:2025-08-19 14:14:00 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 965e162fe6366ee377aa9bc80bdd5c65 (45 x BlankGrabber, 13 x CoinMiner, 9 x Efimer)
ssdeep 98304:O04LIl3SA1h9eT393YigJhH0y3T+q2M51Y7uRlXgVLRuq97dSpXqXg3KhudVj2Cf:O0KnA1HeT39Iig7auDXURuAdSEXHEr
TLSH T1AB86339463F608F9EDB6D13EC1B68149E262B49A87B1C7DF27A006521F277F14836F42
TrID 48.7% (.EXE) Win64 Executable (generic) (10522/11/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
dhash icon c6c2ccc4f4e0e0f8 (37 x PythonStealer, 21 x CrealStealer, 19 x Empyrean)
Reporter jstrosch
Tags:exe X64


Avatar
jstrosch
Found at hxxp://5.83.218[.]183:666/WindowsScreen.exe by #subcrawl

Intelligence


File Origin
# of uploads :
1
# of downloads :
35
Origin country :
CA CA
Vendor Threat Intelligence
Malware family:
meterpreter
ID:
1
File name:
2to1ep.bin
Verdict:
Malicious activity
Analysis date:
2025-08-19 08:31:29 UTC
Tags:
auto metasploit framework python possible-phishing backdoor meterpreter payload github xtinyloader loader miner phishing clickfix stealc stealer modiloader networm amus generic koadic anydesk tool xworm rat redline purelogsstealer asyncrat cobaltstrike agenttesla njrat dbatloader formbook wannacry ransomware stormkitty pyinstaller masslogger snake keylogger storm1747 tycoon vipkeylogger phorpiex evasion quasar stealerium arechclient2 vidar gh0st rmm-tool nanocore remcos meta bladabindi clipper diamotrix loki coinminer remote dcrat telegram teapotstealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
installer autorun virus sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Restart of the analyzed sample
Creating a window
Running batch commands
Creating a process with a hidden window
Launching a process
Creating a file
Sending a custom TCP request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Enabling autorun
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
expand lolbin microsoft_visual_cc obfuscated overlay packed packed packer_detected threat
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Malware.Heuristic
Status:
Malicious
First seen:
2025-08-19 08:19:21 UTC
File Type:
PE+ (Exe)
Extracted files:
478
AV detection:
13 of 24 (54.17%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution persistence pyinstaller
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Adds Run key to start application
Drops startup file
Loads dropped DLL
Boot or Logon Autostart Execution: Active Setup
Unpacked files
SH256 hash:
cc002389575857c05d223e53e4eca5da8428a4ee1b13bd657d83d86a65ff2fdb
MD5 hash:
b7ffb8cd0908bf08597ddaf1a00f01ae
SHA1 hash:
b4109b72e85235aa4778285f86f606d89af565e4
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Detect_PyInstaller
Author:Obscurity Labs LLC
Description:Detects PyInstaller compiled executables across platforms
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:PyInstaller
Author:@bartblaze
Description:Identifies executable converted using PyInstaller. This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe cc002389575857c05d223e53e4eca5da8428a4ee1b13bd657d83d86a65ff2fdb

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
KERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineA
KERNEL32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleOutputCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
WIN_SOCK_APIUses Network to send and receive dataWS2_32.dll::freeaddrinfo
WS2_32.dll::getaddrinfo
WS2_32.dll::getnameinfo
WS2_32.dll::WSASocketW

Comments