MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cd8c11ec94b74fd3357e4b9ed00dfb2c1d94d9b1bba9f6fc4d6c415aa8437b96. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



YoungLotus


Vendor detections: 16


Intelligence 16 IOCs YARA 9 File information Comments 1

SHA256 hash: cd8c11ec94b74fd3357e4b9ed00dfb2c1d94d9b1bba9f6fc4d6c415aa8437b96
SHA3-384 hash: e64c269a6bd853cac9c6d37b6299771f841781fdb6762da30e6f9a5d03184a5d9b199860395ba5727b30f00aa230a187
SHA1 hash: 0d2e61439f901e60851d7f4c17dae9b8439f0e66
MD5 hash: 1953c97029337ec04a8d4b69911d843f
humanhash: alaska-mountain-wolfram-eighteen
File name:1953c97029337ec04a8d4b69911d843f
Download: download sample
Signature YoungLotus
File size:46'592 bytes
First seen:2024-07-03 09:53:22 UTC
Last seen:2025-02-21 21:35:43 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d386d846ec8bc17cdf65ba35a0ab134d (1 x YoungLotus)
ssdeep 768:XKm1dZvlQNI897NooQ7l6f6VW+Y5/gtp/Xy8QcXa6953qWJKQtACa:XKIdZdQC4NS7wjfQp/Xy8pa67qNQqv
TLSH T10123F12772DF4F68EAF54B70B972472800CDC888DA1BD56CBB71A2C84D76850C9747AA
TrID 39.9% (.EXE) UPX compressed Win32 Executable (27066/9/6)
24.3% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
9.7% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.6% (.EXE) Win32 Executable (generic) (4504/4/1)
Reporter zbetcheckin
Tags:32 exe UPX younglotus

Intelligence


File Origin
# of uploads :
3
# of downloads :
336
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
cd8c11ec94b74fd3357e4b9ed00dfb2c1d94d9b1bba9f6fc4d6c415aa8437b96.exe
Verdict:
No threats detected
Analysis date:
2024-07-03 09:55:05 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
Execution Generic Network Stealth Crypt
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a process with a hidden window
Launching the process to change network settings
Searching for synchronization primitives
Creating a service
Launching a service
Creating a process from a recently created file
Connection attempt to an infection source
Launching a process
Creating a window
Sending an HTTP GET request to an infection source
Possible injection to a system process
Creating a file in the Windows subdirectories
Сreating synchronization primitives
Launching the process to change the firewall settings
Blocking the Windows Defender launch
Enabling autorun for a service
Moving of the original file
Query of malicious DNS domain
Enabling autorun
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
lolbin microsoft_visual_cc packed packed packed shell32 upx
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
BlackMoon
Detection:
malicious
Classification:
rans.evad.mine
Score:
100 / 100
Signature
Adds new windows firewall policy
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Downloads files with wrong headers with respect to MIME Content-Type
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain checking for user administrative privileges
Found stalling execution ending in API Sleep call
Found strings related to Crypto-Mining
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the windows firewall
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Uses netsh to modify the Windows network and firewall settings
Yara detected BlackMoon Ransomware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1466781 Sample: 6ymOPj1cxK.exe Startdate: 03/07/2024 Architecture: WINDOWS Score: 100 76 www.4i7i.com 2->76 78 down.ftp21.cc 2->78 80 4 other IPs or domains 2->80 84 Snort IDS alert for network traffic 2->84 86 Multi AV Scanner detection for domain / URL 2->86 88 Malicious sample detected (through community Yara rule) 2->88 90 8 other signatures 2->90 9 mscorsvw.exe 20 2->9         started        14 6ymOPj1cxK.exe 4 3 2->14         started        16 svchost.exe 2->16         started        signatures3 process4 dnsIp5 82 down.ftp21.cc 119.203.212.165, 49731, 64435, 80 KIXS-AS-KRKoreaTelecomKR Korea Republic of 9->82 68 C:\Windows\SysWOW64\config\...\445[1].jpg, PE32 9->68 dropped 70 C:\Windows\4455.exe, PE32 9->70 dropped 98 Found stalling execution ending in API Sleep call 9->98 100 Drops executables to the windows directory (C:\Windows) and starts them 9->100 18 4455.exe 9->18         started        22 mscorsvw.exe 9->22         started        32 33 other processes 9->32 72 C:\Windows\Microsoft.NET\...\mscorsvw.exe, PE32 14->72 dropped 74 C:\Windows\...\mscorsvw.exe:Zone.Identifier, ASCII 14->74 dropped 102 Found strings related to Crypto-Mining 14->102 104 Uses netsh to modify the Windows network and firewall settings 14->104 106 Adds new windows firewall policy 14->106 108 2 other signatures 14->108 24 netsh.exe 2 14->24         started        26 netsh.exe 2 14->26         started        28 netsh.exe 2 14->28         started        34 7 other processes 14->34 30 WerFault.exe 16->30         started        36 30 other processes 16->36 file6 signatures7 process8 file9 66 C:\Windows\Logs\RunDllExe.dll, PE32+ 18->66 dropped 92 Multi AV Scanner detection for dropped file 18->92 94 Found evasive API chain checking for user administrative privileges 18->94 38 netsh.exe 18->38         started        50 8 other processes 18->50 40 WerFault.exe 22->40         started        42 conhost.exe 24->42         started        44 conhost.exe 26->44         started        46 conhost.exe 28->46         started        96 Drops executables to the windows directory (C:\Windows) and starts them 30->96 52 3 other processes 32->52 54 7 other processes 34->54 48 conhost.exe 36->48         started        signatures10 process11 process12 56 conhost.exe 38->56         started        58 conhost.exe 50->58         started        60 conhost.exe 50->60         started        62 conhost.exe 50->62         started        64 4 other processes 50->64
Threat name:
Win32.Trojan.MintZard
Status:
Malicious
First seen:
2024-07-02 17:37:39 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
22 of 24 (91.67%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
gh0strat
Score:
  10/10
Tags:
family:blackmoon family:gh0strat banker discovery evasion persistence privilege_escalation rat trojan upx
Behaviour
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Event Triggered Execution: Netsh Helper DLL
Drops file in Windows directory
Creates a Windows Service
Drops file in System32 directory
Suspicious use of SetThreadContext
Creates a large amount of network flows
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
UPX packed file
Unexpected DNS network traffic destination
Boot or Logon Autostart Execution: Port Monitors
Downloads MZ/PE file
Modifies Windows Firewall
Server Software Component: Terminal Services DLL
Blackmoon, KrBanker
Detect Blackmoon payload
Gh0st RAT payload
Gh0strat
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
a0ac168e5fb23ba59d93f3d53057909f48d97ca4d3ade0d185b0ef47a7c68287
MD5 hash:
0110e69f2dac4e0c13a65b909a86c24f
SHA1 hash:
05f41e1c525fc6194d9a9e97c3d6be6c900e0591
Detections:
win_younglotus_g0 win_younglotus_auto check_installed_software INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender
SH256 hash:
cab601b45d40ff0613bb5c33abf37c7d644a25e209eef741df2fe8e0b2655dd4
MD5 hash:
27c6538548a88de300c27a439d390b21
SHA1 hash:
7eb1513c29b70ad5ccdbf56fd5189082101a29f9
SH256 hash:
935f8c440fe9b2ad109700e47ed5c11388dc666656a19a69a8b8dc56b5dab519
MD5 hash:
f26ec7e8445aac05a8c2df25e80fec03
SHA1 hash:
ed87e93e004395da93d1d20860920b67bff6ac75
SH256 hash:
24eaa23cf08db782ad25d35d74221c468e2d341235bd9e82b525d1787dd3e630
MD5 hash:
4417a80f38b0eb3d2129acc03b6ed23d
SHA1 hash:
a4b06d7bd1b413370589f4f79cabdf17ffd8f4d7
Detections:
win_younglotus_g0 check_installed_software INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender
SH256 hash:
cd8c11ec94b74fd3357e4b9ed00dfb2c1d94d9b1bba9f6fc4d6c415aa8437b96
MD5 hash:
1953c97029337ec04a8d4b69911d843f
SHA1 hash:
0d2e61439f901e60851d7f4c17dae9b8439f0e66
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Armadillov1xxv2xx
Author:malware-lu
Rule name:Check_OutputDebugStringA_iat
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender
Author:ditekSHen
Description:Detects executables embedding registry key / value combination indicative of disabling Windows Defender features
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:NET
Author:malware-lu
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
Rule name:win_younglotus_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.younglotus.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

YoungLotus

Executable exe cd8c11ec94b74fd3357e4b9ed00dfb2c1d94d9b1bba9f6fc4d6c415aa8437b96

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN_BASE_APIUses Win Base APIKERNEL32.DLL::LoadLibraryA

Comments



Avatar
zbet commented on 2024-07-03 09:53:23 UTC

url : hxxp://107.189.29.100/wmi.jpg