MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d171f74f5d0cb8a469db9262869b3798ae0ed18098b4017207ff7f6e69fcd07a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments 1

SHA256 hash: d171f74f5d0cb8a469db9262869b3798ae0ed18098b4017207ff7f6e69fcd07a
SHA3-384 hash: 05381d8119caa14a74ec25d37426282f6b0261f1a85d2148f51045d180e8dd73360e3e40bcb100e7767fc53927b372ad
SHA1 hash: 1f57731ae15cc509fccf5fdcbf2925354c487bd9
MD5 hash: b4e73272ff37009d2a78313320252c2b
humanhash: golf-virginia-pennsylvania-summer
File name:0909000009000.exe
Download: download sample
File size:992'483 bytes
First seen:2021-04-26 05:31:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ea4e67a31ace1a72683a99b80cf37830 (70 x Formbook, 63 x GuLoader, 54 x Loki)
ssdeep 24576:7E1WabY0/4nsXvo7gBzyOc1e5R0ud0YtUWGdi2+SQ9jDEiEEMad:7N0/q6A7MBcWtpGo2+SQ9jI5K
TLSH 6925232A2CB4D0D6D2A200F58EBF3B007BD58D8525DB41EFE75989B63F517C0CA2A5D2
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
95
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0909000009000.exe
Verdict:
Malicious activity
Analysis date:
2021-04-26 05:40:33 UTC
Tags:
evasion stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a file
Creating a file in the %AppData% subdirectories
Unauthorized injection to a recently created process
Creating a window
Setting a keyboard event handler
Launching a process
Launching the default Windows debugger (dwwin.exe)
Sending a UDP request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
StormKitty
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Installs a global keyboard hook
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Yara detected Generic Dropper
Yara detected StormKitty Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 397554 Sample: 0909000009000.exe Startdate: 26/04/2021 Architecture: WINDOWS Score: 100 60 Malicious sample detected (through community Yara rule) 2->60 62 Yara detected StormKitty Stealer 2->62 64 Yara detected Generic Dropper 2->64 8 fmxjoo.exe 17 2->8         started        12 0909000009000.exe 1 21 2->12         started        14 fmxjoo.exe 17 2->14         started        process3 dnsIp4 38 C:\Users\user\AppData\Local\Temp\...\6gst.dll, PE32 8->38 dropped 66 Detected unpacking (changes PE section rights) 8->66 68 Detected unpacking (overwrites its own PE header) 8->68 70 Maps a DLL or memory area into another process 8->70 17 fmxjoo.exe 8->17         started        40 C:\Users\user\AppData\Roaming\...\fmxjoo.exe, PE32 12->40 dropped 42 C:\Users\user\AppData\Local\Temp\...\6gst.dll, PE32 12->42 dropped 20 0909000009000.exe 1 12->20         started        54 192.168.2.1 unknown unknown 14->54 44 C:\Users\user\AppData\Local\Temp\...\6gst.dll, PE32 14->44 dropped 22 fmxjoo.exe 14->22         started        file5 signatures6 process7 signatures8 56 Sample uses process hollowing technique 17->56 58 Installs a global keyboard hook 17->58 24 AppLaunch.exe 2 17->24         started        28 AppLaunch.exe 15 3 17->28         started        30 AppLaunch.exe 20->30         started        32 AppLaunch.exe 20->32         started        process9 dnsIp10 46 24.107.12.0.in-addr.arpa 24->46 72 Tries to steal Instant Messenger accounts or passwords 24->72 74 Tries to steal Mail credentials (via file access) 24->74 76 Tries to harvest and steal browser information (history, passwords, etc) 24->76 48 24.107.12.0.in-addr.arpa 28->48 50 icanhazip.com 104.22.19.188, 49712, 49721, 80 CLOUDFLARENETUS United States 28->50 52 api.mylnikov.org 172.67.160.130, 443, 49713, 49722 CLOUDFLARENETUS United States 28->52 78 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 30->78 80 May check the online IP address of the machine 30->80 34 WerFault.exe 30->34         started        36 WerFault.exe 32->36         started        signatures11 process12
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-04-26 05:32:10 UTC
AV detection:
14 of 47 (29.79%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
n/a
Score:
  7/10
Tags:
persistence spyware stealer
Behaviour
Checks processor information in registry
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Loads dropped DLL
Reads local data of messenger clients
Unpacked files
SH256 hash:
ed5889aaf308f0a5eb12dd68c37b12753aafaed47b97579232c6ae6615f7cafb
MD5 hash:
57ef79cfc26f3a75101fcb521664ec9f
SHA1 hash:
3720137f552a8a680deac3f24d76213caa0693c2
SH256 hash:
061894ced88db97141cdaf824d15380778c5866d6a444bd35f79628039760dbd
MD5 hash:
73e79a2afddc1a61421eec3da34a9f89
SHA1 hash:
0ddb7bb2210dfea8ea348fed733bdfeabd3d4aac
SH256 hash:
d171f74f5d0cb8a469db9262869b3798ae0ed18098b4017207ff7f6e69fcd07a
MD5 hash:
b4e73272ff37009d2a78313320252c2b
SHA1 hash:
1f57731ae15cc509fccf5fdcbf2925354c487bd9
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-04-26 06:08:21 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [C0032.001] Data Micro-objective::CRC32::Checksum
1) [C0026.002] Data Micro-objective::XOR::Encode Data
4) [C0046] File System Micro-objective::Create Directory
5) [C0048] File System Micro-objective::Delete Directory
6) [C0047] File System Micro-objective::Delete File
7) [C0049] File System Micro-objective::Get File Attributes
8) [C0051] File System Micro-objective::Read File
9) [C0050] File System Micro-objective::Set File Attributes
10) [C0052] File System Micro-objective::Writes File
11) [E1510] Impact::Clipboard Modification
12) [C0036.004] Operating System Micro-objective::Create Registry Key::Registry
13) [C0036.002] Operating System Micro-objective::Delete Registry Key::Registry
14) [C0036.003] Operating System Micro-objective::Open Registry Key::Registry
15) [C0036.005] Operating System Micro-objective::Query Registry Key::Registry
16) [C0036.006] Operating System Micro-objective::Query Registry Value::Registry
17) [C0017] Process Micro-objective::Create Process
18) [C0038] Process Micro-objective::Create Thread