MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d2f4642282933b92336508b254613f20a9db1f8a443669f56f6c354d8b319e1e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: d2f4642282933b92336508b254613f20a9db1f8a443669f56f6c354d8b319e1e
SHA3-384 hash: 5bbd94b8e566bd75a18881817e779d66bba92a14811d7cdd3b30c214d16fcc2ad8ad8aade32b78c4151721e26b8011ea
SHA1 hash: 9cbc8b1dc3480ee5a1df5aa81a24f22225137309
MD5 hash: 2cf6e0df55846c81ee2f985fbfb6ebf6
humanhash: table-single-arkansas-failed
File name:IMG-07072020.exe
Download: download sample
File size:879'104 bytes
First seen:2020-07-07 09:59:42 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9f2de36faf921ad0c138b3f99bf41cbc (2 x FormBook, 2 x NetWire, 1 x AveMariaRAT)
ssdeep 12288:KQLZFPe/Dl8tHMQza6myt7UM677rhsUUnV7n/VEBIPZqKwbtzBS:KMPdtHVpHUTePVcIPZWV
Threatray 5'337 similar samples on MalwareBazaar
TLSH 84157C52F2524D3BD0624A7C9D2B02E95E21BE10291CD8935EF8BF5C9FF97807627263
Reporter abuse_ch
Tags:DHL exe


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: zz107.secure.ne.jp
Sending IP: 27.34.159.1
From: DHL Express | Shipping, Tracking and Courier Delivery Services <no-reply@dhl.com>
Subject: Your Parcel just arrived
Attachment: IMG-07072020.z (contains "IMG-07072020.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
74
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Launching the default Windows debugger (dwwin.exe)
Threat name:
Win32.Backdoor.NetWiredRc
Status:
Malicious
First seen:
2020-07-07 10:01:06 UTC
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
evasion spyware trojan persistence
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Modifies Internet Explorer settings
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: MapViewOfSection
Modifies Internet Explorer settings
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Adds Run entry to start application
Modifies system certificate store
Modifies system certificate store
Adds Run entry to start application
Reads user/profile data of web browsers
Reads user/profile data of web browsers
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

db2af721fe8472b9148b888e4768f965

Executable exe d2f4642282933b92336508b254613f20a9db1f8a443669f56f6c354d8b319e1e

(this sample)

  
Dropped by
MD5 db2af721fe8472b9148b888e4768f965
  
Delivery method
Distributed via e-mail attachment

Comments