MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ce294b3c9e58d2d6394e2aa447ad3b586e0e23cdd22bd050a362bdd57a3e3fe9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 7
| SHA256 hash: | ce294b3c9e58d2d6394e2aa447ad3b586e0e23cdd22bd050a362bdd57a3e3fe9 |
|---|---|
| SHA3-384 hash: | a4326edb1972ff99a4502b96fc4e476420923289ada84b84d528f02f81afbaf2cdc31523507f1885b126f45d87fb9562 |
| SHA1 hash: | f2953a9ba829d6fd1e0955dbc95e55abd08234e1 |
| MD5 hash: | 3694ac62d90c1e9f89145f324dc0e204 |
| humanhash: | gee-kentucky-winter-eight |
| File name: | 3694ac62d90c1e9f89145f324dc0e204.exe |
| Download: | download sample |
| File size: | 719'872 bytes |
| First seen: | 2021-08-08 15:21:13 UTC |
| Last seen: | 2021-08-08 16:01:42 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | df0bf408650a99ce9a9544d9b2764ac7 (1 x RemcosRAT) |
| ssdeep | 12288:MZ/oQGlw+x/oF6Np91m6mJ9G2fUeiDnsmJbtM+bvKAlQrfF8h:EQhw+asfm6P2fZiDn/xXZlQ7 |
| Threatray | 649 similar samples on MalwareBazaar |
| TLSH | T1CBE4AE22E3D14A33E1227A76DC4FA37594237F021E29791B26D61E345F39AE27C570E2 |
| dhash icon | 9874ded6d6d4c853 (1 x RemcosRAT) |
| Reporter | |
| Tags: | exe |
Intelligence
File Origin
# of uploads :
2
# of downloads :
127
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
3694ac62d90c1e9f89145f324dc0e204.exe
Verdict:
Malicious activity
Analysis date:
2021-08-08 15:28:19 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Sending a UDP request
DNS request
Connection attempt
Sending a custom TCP request
Creating a file
Unauthorized injection to a recently created process
Running batch commands
Creating a process with a hidden window
Creating a file in the %AppData% subdirectories
Launching a process
Launching cmd.exe command interpreter
Deleting a recently created file
Creating a process from a recently created file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
Clipboard Hijacker
Detection:
malicious
Classification:
spyw.evad
Score:
100 / 100
Signature
Contains functionality to compare user and computer (likely to detect sandboxes)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Injects a PE file into a foreign processes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses process hollowing technique
Sigma detected: Execution from Suspicious Folder
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Clipboard Hijacker
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Phonzy
Status:
Malicious
First seen:
2021-08-08 14:34:03 UTC
AV detection:
9 of 28 (32.14%)
Threat level:
5/5
Verdict:
malicious
Similar samples:
+ 639 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
8/10
Tags:
persistence
Behaviour
Creates scheduled task(s)
Modifies registry key
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Executes dropped EXE
Unpacked files
SH256 hash:
3f780c466a46983164bacea98a032b4d8626c0ed100f8a5d4ee8813c01538fae
MD5 hash:
0dd2c4e041ae3fdb5e7b1b20b6350dff
SHA1 hash:
b15f00474f67e1b67314976a6852182021b2c00f
SH256 hash:
ce294b3c9e58d2d6394e2aa447ad3b586e0e23cdd22bd050a362bdd57a3e3fe9
MD5 hash:
3694ac62d90c1e9f89145f324dc0e204
SHA1 hash:
f2953a9ba829d6fd1e0955dbc95e55abd08234e1
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
exe ce294b3c9e58d2d6394e2aa447ad3b586e0e23cdd22bd050a362bdd57a3e3fe9
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.