MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d8631f817cb56ca5cf3770d7533e5c678e97ff462949370b3042817b1a48111b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Renamer


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: d8631f817cb56ca5cf3770d7533e5c678e97ff462949370b3042817b1a48111b
SHA3-384 hash: 9a98760214889cbb78ee3368cabde50497728c3ecee9850f6f0905b44958b7b8eef755a1acb315d0abb0724243bc9f2e
SHA1 hash: 6a7f5c06f925c8e6ded18a8e2d9f57e325e347cc
MD5 hash: eaf960af2cd98efcc101b2540f29c89c
humanhash: charlie-arkansas-yankee-spaghetti
File name:Debit_Note.pdf.exe
Download: download sample
Signature Renamer
File size:1'576'960 bytes
First seen:2021-09-27 13:14:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2f095340e94ca508e3b83fb009ebf4cc (18 x Renamer)
ssdeep 24576:ScCT67wHqWis4l+jIACFr5hqjiLDpSJDN93pqb6W8cU4gLQAA:jCpn8t74iA3qb6W8cU4X
Threatray 5'024 similar samples on MalwareBazaar
TLSH T1FB75010BDEEB117BFC552B71D02548B310FBF9F60E464722B6E1E60D2A70FA165384A6
File icon (PE):PE icon
dhash icon 71f0acc6e8f07090 (1 x Renamer)
Reporter James_inthe_box
Tags:exe Renamer

Intelligence


File Origin
# of uploads :
1
# of downloads :
100
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Debit_Note.pdf.exe
Verdict:
Suspicious activity
Analysis date:
2021-09-27 13:16:34 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Malware family:
Gorgon Group
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad.spre.spyw.expl
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops VBS files to the startup folder
Infects executable files (exe, dll, sys, html)
Initial sample is a PE file and has a suspicious name
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Potential malicious VBS script found (suspicious strings)
Sigma detected: Drops script at startup location
Sigma detected: Suspicious Double Extension
Uses an obfuscated file name to hide its real file extension (double extension)
Yara detected Generic Dropper
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1365 Sample: Debit_Note.pdf.exe Startdate: 27/09/2021 Architecture: WINDOWS Score: 100 50 Antivirus detection for dropped file 2->50 52 Antivirus / Scanner detection for submitted sample 2->52 54 Multi AV Scanner detection for dropped file 2->54 56 6 other signatures 2->56 7 Debit_Note.pdf.exe 3 2->7         started        11 Paint.exe 2 2->11         started        13 wscript.exe 1 2->13         started        process3 file4 26 C:\Users\user\AppData\Local\...\filename.exe, PE32 7->26 dropped 58 Detected unpacking (changes PE section rights) 7->58 60 Detected unpacking (overwrites its own PE header) 7->60 62 Potential malicious VBS script found (suspicious strings) 7->62 15 Debit_Note.pdf.exe 128 7->15         started        28 C:\Users\user\AppData\...\filename.vbs, ASCII 11->28 dropped 64 Drops VBS files to the startup folder 11->64 19 Paint.exe 1 11->19         started        21 filename.exe 13->21         started        signatures5 process6 file7 36 C:\Users\user\AppData\Roaming\Paint.exe, PE32 15->36 dropped 38 C:\Program Files\...\officeappguardwin32.exe, PE32 15->38 dropped 40 C:\Program Files\...\msoasb.exe, PE32 15->40 dropped 42 124 other files (51 malicious) 15->42 dropped 44 Infects executable files (exe, dll, sys, html) 15->44 46 Detected unpacking (changes PE section rights) 21->46 48 Detected unpacking (overwrites its own PE header) 21->48 23 filename.exe 4 21->23         started        signatures8 process9 file10 30 C:\Users\user\...\vautoit-v3-setup.exe (copy), PE32 23->30 dropped 32 C:\Users\user\Downloads\autoit-v3-setup.exe, PE32 23->32 dropped 34 C:\Users\user\Downloads\RCX995C.tmp, PE32 23->34 dropped
Threat name:
Win32.Trojan.DistTrack
Status:
Malicious
First seen:
2021-09-27 01:10:22 UTC
AV detection:
41 of 45 (91.11%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops autorun.inf file
Drops startup file
Loads dropped DLL
Unpacked files
SH256 hash:
d8631f817cb56ca5cf3770d7533e5c678e97ff462949370b3042817b1a48111b
MD5 hash:
eaf960af2cd98efcc101b2540f29c89c
SHA1 hash:
6a7f5c06f925c8e6ded18a8e2d9f57e325e347cc
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_Renamer
Author:ditekSHen
Description:Detects Renamer/Tainp variants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments