MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d552f35307e9ce4ea735c7fdddb4bf737463daa68b19b8e02f19a45b3339b928. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: d552f35307e9ce4ea735c7fdddb4bf737463daa68b19b8e02f19a45b3339b928
SHA3-384 hash: 5a8ca44fb885dfdbb2fc663907ba32cc4f3a2ff19565d0e34f9b17bc490bc79b123a1a3a2fdaf49e0cbfe69ff5acf972
SHA1 hash: 396fd1ba48a89823ede711922ccda47931532d64
MD5 hash: 07ff6173347653f4a7c1fcb2551ef2d9
humanhash: floor-august-october-gee
File name:8521000125423.exe
Download: download sample
File size:113'664 bytes
First seen:2022-01-05 14:35:46 UTC
Last seen:2022-01-05 17:11:51 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'607 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 3072:iUuWfu8HnN2EMkhyb+KMbrhTyDU4YsTCsl8eCE8Y:iP8t2EXhyV4rByDmmC7eX8
Threatray 1'532 similar samples on MalwareBazaar
TLSH T1EEB30297FBDC4962D43744391C3A23559EE0A409190186EEF8AC854FAFB06F64ED38A9
File icon (PE):PE icon
dhash icon 4b16d7998a60a6a5
Reporter James_inthe_box
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
136
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
8521000125423.exe
Verdict:
Suspicious activity
Analysis date:
2022-01-05 14:38:44 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
DNS request
Creating a window
Sending a custom TCP request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
clipbanker obfuscated packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
60 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Infostealer.ClipBanker
Status:
Malicious
First seen:
2022-01-05 14:35:15 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious use of AdjustPrivilegeToken
Unpacked files
SH256 hash:
52b6bf08f948c860b7c8edef283ec3e3fb389e104e8a70e702ec947a1b591aea
MD5 hash:
df812828300d8878fdfc75d0b2c201cb
SHA1 hash:
7adcbfa740f17d52b8221eb77863b81780c7ba5f
SH256 hash:
bc3336f2b4a4f2b5459ee6add5cfc3dabf5c3ebc37c6b7978b623f9bd470d846
MD5 hash:
015f799b1305b412ae58905a6ce14473
SHA1 hash:
0e208ad4cf61fd83a0eed53b5728203025326a72
SH256 hash:
d552f35307e9ce4ea735c7fdddb4bf737463daa68b19b8e02f19a45b3339b928
MD5 hash:
07ff6173347653f4a7c1fcb2551ef2d9
SHA1 hash:
396fd1ba48a89823ede711922ccda47931532d64
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments