MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cd167aa1a3248d13d2bcc69cbe52e4b70d908906d33fcdd8efb6ccaa0c3f56a1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 10 File information Comments

SHA256 hash: cd167aa1a3248d13d2bcc69cbe52e4b70d908906d33fcdd8efb6ccaa0c3f56a1
SHA3-384 hash: 87c05dab0d184b1938e540cbeae6f371f7ab1c1f30bfaa4748eeec015f5e1316d7f0ed16b8fca83b1268c6043962537c
SHA1 hash: e259aff07b404303200d7430dcee11bb2c3de20a
MD5 hash: 4919d1f098130665dd6e0999ea5c3e28
humanhash: bluebird-minnesota-venus-xray
File name:random.exe
Download: download sample
File size:684'544 bytes
First seen:2025-03-31 12:27:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e0ce39ce78c8eb68f82b5959720a8081
ssdeep 12288:ESXF9mZ6ydE0dzkglH25uWY8nVTzHhDWB40LJ4jAu2yRLyy0ToCgMWZxW+/:E69/x0JBW5JY8nlF30WjwM3FCrWZxWg
TLSH T1CAE4232B51435065F4C18A7496FEE8E448663C331CE139F72FE1E69E8A365C3DB63606
TrID 27.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
20.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
18.6% (.EXE) Win32 Executable (generic) (4504/4/1)
8.5% (.ICL) Windows Icons Library (generic) (2059/9)
8.3% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
dhash icon 696a6ee2b2b2c2cc (18 x RedLineStealer, 17 x LummaStealer, 16 x CoinMiner)
Reporter aachum
Tags:exe


Avatar
iamaachum
http://176.113.115.7/files/martin3/random.exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
722
Origin country :
ES ES
Vendor Threat Intelligence
Verdict:
Malicious
Score:
96.5%
Tags:
xtreme shell blic
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Launching cmd.exe command interpreter
Launching a process
Creating a window
Creating a file
Moving a recently created file
Replacing files
Reading critical registry keys
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Changing a file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Enabling autorun with the shell\open\command registry branches
Connection attempt to an infection source
Stealing user critical data
Deleting volume shadow copies
Encrypting user's files
Result
Threat name:
n/a
Detection:
malicious
Classification:
rans.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Creates autostart registry keys with suspicious names
Deletes shadow drive data (may be related to ransomware)
Detected unpacking (changes PE section rights)
Joe Sandbox ML detected suspicious sample
May disable shadow drive data (uses vssadmin)
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries Google from non browser process on port 80
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Shadow Copies Deletion Using Operating Systems Utilities
Suspicious powershell command line found
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to harvest and steal browser information (history, passwords, etc)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1652820 Sample: random.exe Startdate: 31/03/2025 Architecture: WINDOWS Score: 100 47 www.google.com 2->47 49 iplis.ru 2->49 51 api.ipify.org 2->51 63 Antivirus / Scanner detection for submitted sample 2->63 65 Multi AV Scanner detection for submitted file 2->65 67 .NET source code contains potential unpacker 2->67 69 5 other signatures 2->69 10 random.exe 1 4 2->10         started        14 PtSFkC9yk6nd5EHorO15XhUe.exe 3 2->14         started        17 PtSFkC9yk6nd5EHorO15XhUe.exe 2->17         started        signatures3 process4 dnsIp5 43 C:\Users\...\PtSFkC9yk6nd5EHorO15XhUe.exe, MS-DOS 10->43 dropped 45 C:\Users\...\PLIiE_qqJmq6bLLYFIPkyH8p.exe, PE32 10->45 dropped 81 Detected unpacking (changes PE section rights) 10->81 83 Creates autostart registry keys with suspicious names 10->83 85 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 10->85 87 Tries to detect sandboxes / dynamic malware analysis system (registry check) 10->87 19 PLIiE_qqJmq6bLLYFIPkyH8p.exe 360 10->19         started        23 cmd.exe 1 10->23         started        25 PtSFkC9yk6nd5EHorO15XhUe.exe 4 2 10->25         started        55 www.google.com 142.250.80.68, 49697, 80 GOOGLEUS United States 14->55 57 iplis.ru 104.21.63.150, 443, 49696 CLOUDFLARENETUS United States 14->57 59 api.ipify.org 104.26.12.205, 443, 49693, 49694 CLOUDFLARENETUS United States 17->59 file6 signatures7 process8 dnsIp9 53 91.219.236.49, 80 SERVERASTRA-ASHU Hungary 19->53 71 Deletes shadow drive data (may be related to ransomware) 19->71 73 Tries to harvest and steal browser information (history, passwords, etc) 19->73 75 Modifies existing user documents (likely ransomware behavior) 19->75 27 cmd.exe 19->27         started        77 Suspicious powershell command line found 23->77 30 cmd.exe 1 23->30         started        32 conhost.exe 23->32         started        79 Queries Google from non browser process on port 80 25->79 signatures10 process11 signatures12 89 May disable shadow drive data (uses vssadmin) 27->89 91 Deletes shadow drive data (may be related to ransomware) 27->91 34 vssadmin.exe 27->34         started        37 conhost.exe 27->37         started        93 Suspicious powershell command line found 30->93 39 powershell.exe 7 30->39         started        process13 signatures14 61 Deletes shadow drive data (may be related to ransomware) 34->61 41 WMIC.exe 1 39->41         started        process15
Threat name:
Win32.Malware.Heuristic
Status:
Malicious
First seen:
2025-03-31 12:28:11 UTC
File Type:
PE (Exe)
Extracted files:
13
AV detection:
14 of 24 (58.33%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
defense_evasion discovery execution persistence
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Checks for VirtualBox DLLs, possible anti-VM trick
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Identifies Wine through registry keys
Command and Scripting Interpreter: PowerShell
Looks for VMWare Tools registry key
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Looks for VirtualBox Guest Additions in registry
Unpacked files
SH256 hash:
cd167aa1a3248d13d2bcc69cbe52e4b70d908906d33fcdd8efb6ccaa0c3f56a1
MD5 hash:
4919d1f098130665dd6e0999ea5c3e28
SHA1 hash:
e259aff07b404303200d7430dcee11bb2c3de20a
SH256 hash:
fd9975c6dd7a146401621dce5102aef684bbd08f82f33f140081a23c297fe97f
MD5 hash:
0d704426f7f012f367cf02c18b402782
SHA1 hash:
2089b147a05868092d0dfbc8336d92ea7ba6bd7a
SH256 hash:
78eb5433af34c2428852eae61e55bf8ac50cc8aae65a3be7884c64b821bdebcf
MD5 hash:
7fde7d27715e2c7bdfad2e4b82cb8a87
SHA1 hash:
6988065a6228fe740524a6b75f15d0c530156167
SH256 hash:
db595f2d4601afcf8a32cb5823a1c51717dca85ba446ead1d76e6541c3f95a1b
MD5 hash:
cad2dc8c614a48411c6d522a959c17b4
SHA1 hash:
c342dc748632d9685fdb0cc6faca6ba5c396533c
SH256 hash:
9f69fb5a660d7f708904d80e6227c2129a148abad30c0883a0b81b5d6c4cf99f
MD5 hash:
9b8790d610b97192133b1754ee175201
SHA1 hash:
c474ace88ed8624fa0950b61397cc34b55935298
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Active
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MAL_packer_lb_was_detected
Author:0x0d4y
Description:Detect the packer used by Lockbit4.0
Rule name:pe_detect_tls_callbacks
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe cd167aa1a3248d13d2bcc69cbe52e4b70d908906d33fcdd8efb6ccaa0c3f56a1

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_TRUST_INFORequires Elevated Execution (uiAccess:None)high
Reviews
IDCapabilitiesEvidence
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteA
WIN_BASE_APIUses Win Base APIKERNEL32.DLL::LoadLibraryA

Comments