MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d17068cc5a649c9207f0e197fc035a26a83c295323d880cb6f5753ad8de5426f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: d17068cc5a649c9207f0e197fc035a26a83c295323d880cb6f5753ad8de5426f
SHA3-384 hash: fabea4abd25412d703611c63a266d2eb496ba24e649f4304e1e0d18b9ee6dd14cff644756de5441e4430a706a542a7f9
SHA1 hash: e7b55cc737a8cfb12360b86744666317f18570bc
MD5 hash: 4d5ab4e4cd61262a83b60274a6c62b7a
humanhash: double-alanine-hot-march
File name:ETF_SETUP.exe
Download: download sample
File size:4'505'330 bytes
First seen:2022-06-22 04:42:54 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b8494300a1f7342d4c600a7b12e15925 (3 x RedLineStealer, 3 x RemoteManipulator, 1 x njrat)
ssdeep 98304:TXz+1wrwK57Q1JW7nztPHpMMTw624FQZCnZOENW0vDHdmx/:jK1afU1JWbztPO3IFQZCsjcC
Threatray 477 similar samples on MalwareBazaar
TLSH T15E263374B049CAF6C2A21D390403B35EFB39BA405B2D62CF37D84F758E7635A26562D2
TrID 86.6% (.EXE) Win32 Executable Borland Delphi 7 (664796/42/58)
5.6% (.EXE) InstallShield setup (43053/19/16)
1.8% (.EXE) Win32 Executable Delphi generic (14182/79/4)
1.7% (.SCR) Windows screen saver (13101/52/3)
1.3% (.EXE) DOS Borland compiled Executable (generic) (10000/1/2)
File icon (PE):PE icon
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter Jagdtiger88mm
Tags:exe malicious W32.AIDetect.malware2

Intelligence


File Origin
# of uploads :
1
# of downloads :
243
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
d17068cc5a649c9207f0e197fc035a26a83c295323d880cb6f5753ad8de5426f.exe
Verdict:
Malicious activity
Analysis date:
2022-06-22 05:00:27 UTC
Tags:
installer opendir

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Delayed reading of the file
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
CheckCmdLine
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Unpacked files
SH256 hash:
d17068cc5a649c9207f0e197fc035a26a83c295323d880cb6f5753ad8de5426f
MD5 hash:
4d5ab4e4cd61262a83b60274a6c62b7a
SHA1 hash:
e7b55cc737a8cfb12360b86744666317f18570bc
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:exploit_any_poppopret
Author:Jeff White [karttoon@gmail.com] @noottrak
Description:Identify POP -> POP -> RET opcodes for quick ROP Gadget creation in target binaries.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments