MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d15e506977055556f490656e5abddb4c774ed22f58d7fa6ec6523e0148911408. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: d15e506977055556f490656e5abddb4c774ed22f58d7fa6ec6523e0148911408
SHA3-384 hash: 0f5b71a32e146d4288c91364594faa5a088a99e10d00ad329459d1c271f662b3a840461a7dde2e653dc1649648584081
SHA1 hash: 2a360ca9b1f8773c041705cc46c712321f8f7f26
MD5 hash: b4484c2ad864b9a48d478d4b5feefb53
humanhash: sink-carbon-three-jupiter
File name:b4484c2ad864b9a48d478d4b5feefb53.exe
Download: download sample
File size:1'526'182 bytes
First seen:2022-01-12 07:33:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 24576:jFL23n5BfJXAENzLVDs4PyamuOESNFQuEYaj/vby2gKhKE2nZCGNVy723Pd6LDsM:F0BfJXAEhFfyTu5Oioz2Xh2C03PbTU
TLSH T1DC659B00BF71446BC95E36B28912DF827CBD6C88ED2CAD05F26A1457DB7C360792AE53
File icon (PE):PE icon
dhash icon b3b3b371716b93b3 (25 x CryptOne, 12 x RemcosRAT, 6 x RedLineStealer)
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
188
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
b4484c2ad864b9a48d478d4b5feefb53.exe
Verdict:
Suspicious activity
Analysis date:
2022-01-12 07:46:37 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% directory
DNS request
Launching a process
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Sigma detected: Shell32 DLL Execution in Suspicious Directory
Sigma detected: Suspicious Call by Ordinal
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 551451 Sample: aieAaepq33.exe Startdate: 12/01/2022 Architecture: WINDOWS Score: 48 22 Sigma detected: Suspicious Call by Ordinal 2->22 24 Sigma detected: Shell32 DLL Execution in Suspicious Directory 2->24 9 aieAaepq33.exe 3 8 2->9         started        process3 file4 20 C:\Users\user\AppData\Local\...\dPTGiJS5.cpl, PE32 9->20 dropped 12 control.exe 1 9->12         started        process5 process6 14 rundll32.exe 12->14         started        process7 16 rundll32.exe 14->16         started        process8 18 rundll32.exe 16->18         started       
Threat name:
Win32.Trojan.Bunitucrypt
Status:
Malicious
First seen:
2022-01-12 07:34:41 UTC
File Type:
PE (Exe)
Extracted files:
18
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Loads dropped DLL
Unpacked files
SH256 hash:
d15e506977055556f490656e5abddb4c774ed22f58d7fa6ec6523e0148911408
MD5 hash:
b4484c2ad864b9a48d478d4b5feefb53
SHA1 hash:
2a360ca9b1f8773c041705cc46c712321f8f7f26
Malware family:
CryptOne
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments