MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d84629725c1f765d4413ca1f2157c19e8a52d8b1fd603473853026cf93168b94. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Ransomware.BlackMatter
Vendor detections: 6
| SHA256 hash: | d84629725c1f765d4413ca1f2157c19e8a52d8b1fd603473853026cf93168b94 |
|---|---|
| SHA3-384 hash: | 1f1b0b92ffe93f3d632bc436085145517e226637cff7c3b6b0a6fa16b2a53e101ed7c8c7f946d88510c0438817c21b3b |
| SHA1 hash: | af3f2ff4d03346b2bb8b959db96ddc431a6eadcb |
| MD5 hash: | adde5bf696564d04e75df69a4fbf5fd8 |
| humanhash: | pasta-papa-johnny-single |
| File name: | Document.zip |
| Download: | download sample |
| Signature | Ransomware.BlackMatter |
| File size: | 12'276 bytes |
| First seen: | 2024-04-29 13:17:44 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 192:1iseH9Bzw+saP0JjFvGpnSusSNR3Vf3Z5vcH0mR+cUx7oWmFnj0Vmz6qHaU42:11eHg+swKKn8633ZVi0e+HodnIVmz60r |
| TLSH | T19B42BFEB51E55C6EFC152FAF6FB1EFD6B6B0F4A0AE83285166C1A0D217AB611B010018 |
| TrID | 80.0% (.ZIP) ZIP compressed archive (4000/1) 20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1) |
| Reporter | |
| Tags: | Ransomware.BlackMatter zip |
cocaman
Malicious email (T1566.001)From: "Jenny Green <Jenny@gsd.com>" (likely spoofed)
Received: "from [89.144.157.107] (unknown [89.144.157.107]) "
Date: "Mon, 29 Apr 2024 16:58:36 +0430"
Subject: "Your Document"
Attachment: "Document.zip"
Intelligence
File Origin
# of uploads :
1
# of downloads :
116
Origin country :
CHFile Archive Information
This file archive contains 1 file(s), sorted by their relevance:
| File name: | Document.doc.scr |
|---|---|
| File size: | 39'196 bytes |
| SHA256 hash: | fef8602c604534d9bfed5fc0151dac2454d5f1db980eda8f13ec113746d5839f |
| MD5 hash: | e899320be6735decd10f17f3e9fb4f8f |
| MIME type: | application/x-dosexec |
| Signature | Ransomware.BlackMatter |
Vendor Threat Intelligence
Gathering data
Verdict:
Suspicious
Labled as:
Troj/Invo
Result
Verdict:
MALICIOUS
Link:
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Binary.Trojan.MintZard
Status:
Malicious
First seen:
2024-04-29 13:17:46 UTC
File Type:
Binary (Archive)
Extracted files:
4
AV detection:
8 of 38 (21.05%)
Threat level:
5/5
Detection(s):
Suspicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Ransomware.BlackMatter
zip d84629725c1f765d4413ca1f2157c19e8a52d8b1fd603473853026cf93168b94
(this sample)
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.