MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cc81b5085ea098d0d117dfe38aa46b5513f66d34c23454c964cdd3f0864967e7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: cc81b5085ea098d0d117dfe38aa46b5513f66d34c23454c964cdd3f0864967e7
SHA3-384 hash: e93b677f8bb427143b1ed38c407da916aaef14b8463d33fbe4d023ee2080fa1e9778458f1cdcd8259fa57ca024908e7e
SHA1 hash: 5d5a50e0782d098c39b954251698784beb2695a1
MD5 hash: 29ade0e75d0c0c108ea863905e2b2730
humanhash: fish-vegan-sweet-sierra
File name:631f692f769adg
Download: download sample
File size:5'349'888 bytes
First seen:2022-09-13 06:50:46 UTC
Last seen:2022-09-13 10:07:53 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9aebf3da4677af9275c461261e5abde3 (25 x YTStealer, 12 x CobaltStrike, 11 x Hive)
ssdeep 98304:udgpryHXUFxs3Enrg9HqbbJfIgtc46pcsPaE3ubxRP91D+u+XaX5:MgByewErg9HUlfIgEH3ubxRP9wuI+
Threatray 30 similar samples on MalwareBazaar
TLSH T10546336526B8B4E7E87E72B2062AA9D4F26153D125002393602FF4DFC2DCDA44DCBAD5
TrID 64.7% (.EXE) UPX compressed Win64 Executable (70117/5/12)
25.0% (.EXE) UPX compressed Win32 Executable (27066/9/6)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.8% (.EXE) OS/2 Executable (generic) (2029/13)
1.8% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter JAMESWT_WT
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
215
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
01dd09f52d0accfd655731ed746a9c3742dc7ee7684aa5a4002155897147dc20
Verdict:
Malicious activity
Analysis date:
2022-09-13 06:47:51 UTC
Tags:
trojan stealer arkei loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Launching a process
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad.spyw
Score:
72 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 701807 Sample: 631f692f769adg.exe Startdate: 13/09/2022 Architecture: WINDOWS Score: 72 23 goback.delivery 2->23 25 Antivirus detection for URL or domain 2->25 27 Antivirus / Scanner detection for submitted sample 2->27 29 Multi AV Scanner detection for submitted file 2->29 8 631f692f769adg.exe 2->8         started        signatures3 process4 process5 10 powershell.exe 11 8->10         started        13 powershell.exe 11 8->13         started        15 powershell.exe 11 8->15         started        signatures6 31 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 10->31 33 Queries memory information (via WMI often done to detect virtual machines) 10->33 17 conhost.exe 10->17         started        19 conhost.exe 13->19         started        21 conhost.exe 15->21         started        process7
Threat name:
Win64.Infostealer.BroPass
Status:
Malicious
First seen:
2022-09-13 06:51:20 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
10 of 26 (38.46%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware stealer upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Reads user/profile data of web browsers
UPX packed file
Unpacked files
SH256 hash:
d3196cfc5aa5de3402edf748fce7c8414d4872d375ca42f4cc01f6d1e20cd92d
MD5 hash:
1e5fbcf43e7ca09773c48760f7d6e9a4
SHA1 hash:
966d32315c88ea23dfb26b43d66b9c3df3f34827
SH256 hash:
cc81b5085ea098d0d117dfe38aa46b5513f66d34c23454c964cdd3f0864967e7
MD5 hash:
29ade0e75d0c0c108ea863905e2b2730
SHA1 hash:
5d5a50e0782d098c39b954251698784beb2695a1
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe cc81b5085ea098d0d117dfe38aa46b5513f66d34c23454c964cdd3f0864967e7

(this sample)

  
Delivery method
Distributed via web download

Comments