MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d65629e6028c54eb383b310547426ed1907296a14a2e8977b9d469126de1f8a9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 5 File information Comments

SHA256 hash: d65629e6028c54eb383b310547426ed1907296a14a2e8977b9d469126de1f8a9
SHA3-384 hash: 99bb3a4085be9aa557c3248f97618cc301f2c3aed9c3529e01d7310dc313cc7df1f0ad07bab4a8fac6d1223231af646a
SHA1 hash: b098b5f859f45314d5edd03aad9eab420bbdec40
MD5 hash: 07fc5b4f3a432b09b0d51f8b00ef05f3
humanhash: low-mississippi-freddie-snake
File name:file
Download: download sample
File size:11'950'592 bytes
First seen:2024-09-24 23:09:22 UTC
Last seen:2024-10-04 13:42:55 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 266fe50b75556d32a77ba4347fd8a6b3
ssdeep 98304:CdwqvpPlIpF6+2UT0lursS0lU7heqdQI:qwqhPlIp12C0luoU7h
TLSH T1E8C65B7F76A18629C22EC23AC0A38F04E93370BD1733C6E793A45169DF599D45E3E624
TrID 77.6% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
14.1% (.EXE) Win64 Executable (generic) (10523/12/4)
2.7% (.EXE) OS/2 Executable (generic) (2029/13)
2.6% (.EXE) Generic Win/DOS Executable (2002/3)
2.6% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
File icon (PE):PE icon
dhash icon f8eceee8e8e8d0f0 (2 x Dridex, 1 x QuasarRAT)
Reporter Bitsight
Tags:exe


Avatar
Bitsight
url: http://147.45.44.104/malesa/66f3133924366_784865439765.exe#68

Intelligence


File Origin
# of uploads :
5
# of downloads :
521
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
No threats detected
Analysis date:
2024-09-24 23:10:46 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
Execution Generic Network Stealth Powershell Exploit Tori
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Searching for the window
Restart of the analyzed sample
Connecting to a non-recommended domain
Connection attempt
Sending a custom TCP request
Creating a file in the %temp% directory
Launching cmd.exe command interpreter
Adding an exclusion to Microsoft Defender
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
embarcadero_delphi expand fingerprint keylogger lolbin
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Changes security center settings (notifications, updates, antivirus, firewall)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to hide user accounts
Found Tor onion address
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
NDIS Filter Driver detected (likely used to intercept and sniff network traffic)
Query firmware table information (likely to detect VMs)
Sigma detected: Execution from Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious New Service Creation
Sigma detected: Suspicious Program Location with Network Connections
Suricata IDS alerts for network traffic
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1517355 Sample: file.exe Startdate: 25/09/2024 Architecture: WINDOWS Score: 100 83 time.windows.com 2->83 97 Suricata IDS alerts for network traffic 2->97 99 NDIS Filter Driver detected (likely used to intercept and sniff network traffic) 2->99 101 Contains functionality to hide user accounts 2->101 103 7 other signatures 2->103 9 main.exe 2->9         started        14 file.exe 3 2->14         started        16 main.exe 2->16         started        18 11 other processes 2->18 signatures3 process4 dnsIp5 85 184.65.173.183 SHAWCA Canada 9->85 87 88.210.6.42 CITYLAN-ASRU Russian Federation 9->87 95 47 other IPs or domains 9->95 71 C:\Windows\Temp\x8eec9dQ, PE32+ 9->71 dropped 73 C:\Windows\Temp\nHqxqt5L, PE32+ 9->73 dropped 75 C:\Windows\Temp\miECvZvT, PE32+ 9->75 dropped 81 15 other files (13 malicious) 9->81 dropped 117 Contains functionality to hide user accounts 9->117 119 Found Tor onion address 9->119 20 WerFault.exe 9->20         started        89 94.156.68.124, 1122, 49700 TERASYST-ASBG Bulgaria 14->89 77 C:\Users\user\...\yhar2he6rpt6n0h1w6rh.exe, PE32+ 14->77 dropped 79 C:\Users\user\...\lr75sq5smrngkif9fpn.exe, PE32+ 14->79 dropped 23 yhar2he6rpt6n0h1w6rh.exe 10 14->23         started        26 cmd.exe 1 14->26         started        28 lr75sq5smrngkif9fpn.exe 3 14->28         started        91 139.162.110.14 LINODE-APLinodeLLCUS Netherlands 16->91 93 2.135.133.55 KAZTELECOM-ASKZ Kazakhstan 16->93 121 Query firmware table information (likely to detect VMs) 18->121 123 Changes security center settings (notifications, updates, antivirus, firewall) 18->123 30 MpCmdRun.exe 18->30         started        32 WerFault.exe 18->32         started        file6 signatures7 process8 file9 67 C:\ProgramData\Microsoft\...\Report.wer, Unicode 20->67 dropped 69 C:\Users\Public\...\main.exe, PE32+ 23->69 dropped 105 Multi AV Scanner detection for dropped file 23->105 107 Contains functionality to hide user accounts 23->107 109 Machine Learning detection for dropped file 23->109 111 Found Tor onion address 23->111 34 taskkill.exe 23->34         started        36 sc.exe 23->36         started        38 sc.exe 23->38         started        51 4 other processes 23->51 113 Adds a directory exclusion to Windows Defender 26->113 40 powershell.exe 23 26->40         started        43 powershell.exe 23 26->43         started        45 powershell.exe 17 26->45         started        47 conhost.exe 26->47         started        49 conhost.exe 30->49         started        signatures10 process11 signatures12 53 conhost.exe 34->53         started        55 conhost.exe 36->55         started        57 conhost.exe 38->57         started        115 Loading BitLocker PowerShell Module 40->115 59 conhost.exe 51->59         started        61 conhost.exe 51->61         started        63 conhost.exe 51->63         started        65 conhost.exe 51->65         started        process13
Result
Malware family:
n/a
Score:
  10/10
Tags:
execution
Behaviour
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Executes dropped EXE
Command and Scripting Interpreter: PowerShell
Suspicious use of NtCreateUserProcessOtherParentProcess
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
d65629e6028c54eb383b310547426ed1907296a14a2e8977b9d469126de1f8a9
MD5 hash:
07fc5b4f3a432b09b0d51f8b00ef05f3
SHA1 hash:
b098b5f859f45314d5edd03aad9eab420bbdec40
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:pe_detect_tls_callbacks

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe d65629e6028c54eb383b310547426ed1907296a14a2e8977b9d469126de1f8a9

(this sample)

  
Dropped by
Privateloader
  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
ole32.dll::CreateStreamOnHGlobal
MULTIMEDIA_APICan Play Multimediagdi32.dll::StretchDIBits
winmm.dll::timeGetTime
SHELL_APIManipulates System Shellshell32.dll::ShellExecuteW
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CloseHandle
kernel32.dll::CreateThread
WIN_BASE_APIUses Win Base APIkernel32.dll::LoadLibraryExW
kernel32.dll::LoadLibraryA
kernel32.dll::LoadLibraryW
kernel32.dll::GetSystemInfo
kernel32.dll::GetStartupInfoW
kernel32.dll::GetDiskFreeSpaceW
WIN_BASE_IO_APICan Create Fileskernel32.dll::CreateFileW
kernel32.dll::DeleteFileW
kernel32.dll::GetSystemDirectoryW
kernel32.dll::GetFileAttributesW
kernel32.dll::FindFirstFileW
kernel32.dll::RemoveDirectoryW
WIN_REG_APICan Manipulate Windows Registryadvapi32.dll::RegConnectRegistryW
advapi32.dll::RegCreateKeyExW
advapi32.dll::RegDeleteKeyW
advapi32.dll::RegLoadKeyW
advapi32.dll::RegOpenKeyExW
advapi32.dll::RegQueryInfoKeyW
WIN_USER_APIPerforms GUI Actionsuser32.dll::ActivateKeyboardLayout
user32.dll::AppendMenuW
user32.dll::CreateMenu
user32.dll::EmptyClipboard
user32.dll::FindWindowExW
user32.dll::FindWindowW

Comments