MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d816c7ccdb90ec7d80aa1700a5133bdfa368e10f6d634bb3c94949feaa99fee9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: d816c7ccdb90ec7d80aa1700a5133bdfa368e10f6d634bb3c94949feaa99fee9
SHA3-384 hash: b8c1ec030c8020ec40dfda9dd57df9004d8045572f7a5b3924625f2654468a29aa05661172fc10d0e3f0c9e8e061ab2a
SHA1 hash: 362b925d952504540f35685356122897ca8c6156
MD5 hash: 43607abe9ebf5214f35d2a87b18fd0f5
humanhash: carbon-kansas-stairway-beer
File name:SecuriteInfo.com.Trojan.Heur.eL7a7xmdRFbQ.10219.3612
Download: download sample
File size:1'116'486 bytes
First seen:2023-05-19 16:30:24 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 7e7d2a887eef55a74fdb37e36a104f6f
ssdeep 24576:/o12SC4Ci16ujMi3ohlU5pzvizKfcKFxou:Q13y9ujMi38kpezKN/ou
Threatray 39 similar samples on MalwareBazaar
TLSH T17135120A77A47151F2FB27748A7B429C0C367C45BD22DD5F2220388E58F5E51E9BA32B
TrID 28.8% (.EXE) Win32 Executable (generic) (4505/5/1)
19.2% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
13.2% (.EXE) Win16/32 Executable Delphi generic (2072/23)
12.9% (.EXE) OS/2 Executable (generic) (2029/13)
12.8% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter SecuriteInfoCom
Tags:dll

Intelligence


File Origin
# of uploads :
1
# of downloads :
279
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware lolbin lolbin overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
72 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
PE file has nameless sections
System process connects to network (likely due to code injection or exploit)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 870397 Sample: SecuriteInfo.com.Trojan.Heu... Startdate: 19/05/2023 Architecture: WINDOWS Score: 72 26 Antivirus / Scanner detection for submitted sample 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 Machine Learning detection for sample 2->30 32 PE file has nameless sections 2->32 8 loaddll32.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 conhost.exe 8->12         started        process5 14 rundll32.exe 6 10->14         started        dnsIp6 22 www.pasionnatual.webs.com 104.18.151.58, 49710, 80 CLOUDFLARENETUS United States 14->22 24 192.168.2.1 unknown unknown 14->24 34 System process connects to network (likely due to code injection or exploit) 14->34 18 WerFault.exe 23 9 14->18         started        20 WerFault.exe 2 9 14->20         started        signatures7 process8
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2023-05-19 16:31:06 UTC
File Type:
PE (Dll)
Extracted files:
80
AV detection:
10 of 37 (27.03%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
aspackv2
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Blocklisted process makes network request
Unpacked files
SH256 hash:
d816c7ccdb90ec7d80aa1700a5133bdfa368e10f6d634bb3c94949feaa99fee9
MD5 hash:
43607abe9ebf5214f35d2a87b18fd0f5
SHA1 hash:
362b925d952504540f35685356122897ca8c6156
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments