MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d890aeafeeac4d6c2d8a1ff8b4d377d9084455a4d46b642da837c05d9b53cdbb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TinyNuke


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: d890aeafeeac4d6c2d8a1ff8b4d377d9084455a4d46b642da837c05d9b53cdbb
SHA3-384 hash: a3af10c454458515bca950790e904734fa040900c58b1cd77b8d1aaf4901e83a32e6b69e826ead9946ccfe6b56b20cff
SHA1 hash: f499e4c5d81b1490b9380d24b78bd3746b15564d
MD5 hash: 0deb4397221634cbffbddcb6829220a6
humanhash: colorado-michigan-football-romeo
File name:tinynuke.exe
Download: download sample
Signature TinyNuke
File size:5'762'117 bytes
First seen:2021-12-15 17:09:42 UTC
Last seen:2021-12-15 18:44:13 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2fb819a19fe4dee5c03e8c6a79342f79 (56 x Adware.InstallCore, 8 x RedLineStealer, 7 x Adware.ExtenBro)
ssdeep 98304:X5IXgbI5Zdy3Bvoy0fO++L4rufACHPbD9BZPLfaCfGDd3bIhrdCzjZysWq4qg4ef:g0VoymO+prB83ZPGCuDdEhrYPTW9qI6i
Threatray 9'308 similar samples on MalwareBazaar
TLSH T1CE4633B71AA24572E6C5EE7DFDD3A45C213FA26D3D2463F13265C11CDC13F8AA2A0129
File icon (PE):PE icon
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter 0x746f6d6669
Tags:exe TinyNuke

Intelligence


File Origin
# of uploads :
2
# of downloads :
756
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
tinynuke.exe
Verdict:
Malicious activity
Analysis date:
2021-12-15 17:13:10 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
Moving a file to the %temp% subdirectory
Creating a file in the %AppData% subdirectories
Creating a file
Moving a file to the %AppData% subdirectory
Sending a custom TCP request
DNS request
Replacing files
Delayed writing of the file
Changing a file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Changing settings of the browser security zones
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware overlay packed tinynuke
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
TinyNuke
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
92 / 100
Signature
Antivirus detection for dropped file
Installs TOR (Internet Anonymizer)
May use the Tor software to hide its network traffic
Modifies Internet Explorer zone settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected TinyNuke
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 540497 Sample: tinynuke.exe Startdate: 15/12/2021 Architecture: WINDOWS Score: 92 54 Antivirus detection for dropped file 2->54 56 Multi AV Scanner detection for dropped file 2->56 58 Multi AV Scanner detection for submitted file 2->58 60 2 other signatures 2->60 9 tinynuke.exe 2 2->9         started        process3 file4 36 C:\Users\user\AppData\Local\...\tinynuke.tmp, PE32 9->36 dropped 66 Obfuscated command line found 9->66 13 tinynuke.tmp 5 71 9->13         started        signatures5 process6 file7 38 C:\Users\user\AppData\Local\...\is-OH7IN.tmp, PE32 13->38 dropped 40 C:\Users\user\AppData\...\firefox.exe (copy), PE32 13->40 dropped 42 C:\Users\user\...\8979876876.dll (copy), PE32 13->42 dropped 44 115 other files (none is malicious) 13->44 dropped 16 firefox.exe 1 68 13->16         started        process8 file9 28 C:\Users\user\AppData\Roaming\...\tor.exe, PE32 16->28 dropped 30 C:\Users\user\AppData\Roaming\...\firefox.exe, PE32 16->30 dropped 32 C:\Users\user\AppData\Roaming\...\zlib1.dll, PE32 16->32 dropped 34 57 other files (none is malicious) 16->34 dropped 52 Installs TOR (Internet Anonymizer) 16->52 20 firefox.exe 3 1 16->20         started        23 tor.exe 9 16->23         started        signatures10 process11 dnsIp12 62 Modifies Internet Explorer zone settings 20->62 64 Tries to harvest and steal browser information (history, passwords, etc) 20->64 26 tor.exe 1 20->26         started        46 178.17.170.156, 49770, 49771, 9001 TRABIAMD Moldova Republic of 23->46 48 147.87.116.56, 49783, 9001 SWITCHPeeringrequestspeeringswitchchEU Switzerland 23->48 50 5 other IPs or domains 23->50 signatures13 process14
Threat name:
Win32.Infostealer.TinyNuke
Status:
Malicious
First seen:
2021-09-22 22:29:11 UTC
File Type:
PE (Exe)
Extracted files:
102
AV detection:
19 of 45 (42.22%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence spyware stealer
Behaviour
Modifies Internet Explorer Protected Mode
Modifies Internet Explorer Protected Mode Banner
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Adds Run key to start application
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Unpacked files
SH256 hash:
3d2a4647a066429648da2445a5df1658be4a7317dcfe515eebd9c1b5eff93a88
MD5 hash:
9df74e9e10d581e9e9c5bc7f56a35f10
SHA1 hash:
e0a14e2a7e4aa22bb2dab3442c41b69c2c570ecf
Detections:
win_tinynuke_g0 win_tinynuke_auto
SH256 hash:
2c809e56baa0549b12221ab41836b96064f8979cf65c5ec1f61cf37bf0032ebb
MD5 hash:
7347466d0e1d0ec88d06e8e5e1b3b980
SHA1 hash:
80abf0bc68657f534ab92fd411c3489a85aa8f53
SH256 hash:
a79ed0d04c9105cac12bfd95ed43a338890ba287a1eace3497bb3d568aa4c73a
MD5 hash:
6846c2578016c0182e92b36a570283cb
SHA1 hash:
7d0d9ba0f41fddbd5363536b78588520b16730b2
Detections:
win_tinynuke_g0 win_tinynuke_auto
SH256 hash:
dbf683ac68be433c6f1e4f76c0981fca5e624069d9046a3bff2300868e24b5bf
MD5 hash:
34d9c45b3319ea5b58ad37dc222e635a
SHA1 hash:
2f62a928113939a7b8f664b93ccd9ebdf6678699
SH256 hash:
d29dcfadc80322cc47a24cef75ed5d9cdaa1f3c609bef6c358534cc2c522f220
MD5 hash:
302ffbf70e4b032f38d4bb671ff01e29
SHA1 hash:
1b13c0b3c960206a3e06cae52ca8dad4178541af
SH256 hash:
f1e142c6292c05cedbfff95dac6977743a8b4b00c296174d90f18c49cf2e9979
MD5 hash:
23a8c37a3d6fea610c0cb489a742f43f
SHA1 hash:
d5876125a3e316add5d54f15c7f2cdf63379d409
SH256 hash:
8cfe65149b18fa88eb41e7a2ac7a0de2bc238aa64cc72afd9101aa3de4c90d22
MD5 hash:
b49b1dfa052d40cc7dcc202ab8ceb1b9
SHA1 hash:
620dcabb62d30921dd02ca885397d061e1ead25a
SH256 hash:
a078dd9fd5b294943c186a48c1771cd3b56bb9b77996365142ecd13e53cfe8c1
MD5 hash:
177d490e787e1fb38804f5cda7185304
SHA1 hash:
ecc24d146574a84c39ffb1f931942af9663cf845
SH256 hash:
fdf02db46f5e15dbd222f0e2a02e3f01c7a363b07983129b750814a7ae72733e
MD5 hash:
d7da5956a00c00b3fdc9b7059447c788
SHA1 hash:
e199812a297d07ef3c6d259098159c7aaea17f41
SH256 hash:
c342d685dd122db37ddd4bf18903b929a8a3697e2787b2dbd539753683b61f28
MD5 hash:
104ff43b4670a0213f250c5416b493c8
SHA1 hash:
e12090883f56730ccae84a27cf9ccb276178bc3a
SH256 hash:
5af5f3a6c4591b8eeff5665588444fb59fabe29ee2e3de4649d04553026cea44
MD5 hash:
790172834f70e1b7e13d65bdb97dadb3
SHA1 hash:
daad4e5cdb0fdbaa57595bf887ae463c5e30de61
SH256 hash:
e603ade593ebb3cdc53eaa7f5408e3bede483556ec5a6ca15527de7aaf8f278f
MD5 hash:
00a0274079d830250f17d2bd2b293286
SHA1 hash:
d8d5a530f985e4c4f011bcc3483c3fd800504453
SH256 hash:
28c9a5e99a353226d8a7432ac622dc21852a203186064b8835fe21c86e666019
MD5 hash:
f3f4a9a146349c28fc5bf02b3ece558c
SHA1 hash:
c2003f64ee33e2772c6ce2d80b299f9f8e25cf74
SH256 hash:
efe3073f87f01aebbd8c70b4a75710b5c3b997f0d9f93d25d15ec175619da502
MD5 hash:
0e080ce7233159d852b77f4cb66640d6
SHA1 hash:
ba54996bed53f73b54019309f4199a794bc9c367
SH256 hash:
40880850cf7cb00e455f5846259c60b9daadcb14c42f93e061c93c22a2fa9b33
MD5 hash:
4896837bb17070dd101cef53ea81ad1a
SHA1 hash:
b180dc8af1ff9d5e7dd932b011fe87fd19610adf
SH256 hash:
7390811763509de26f20591038514a000276c3debac9a7e86ec6f1277e7a6767
MD5 hash:
201c4ecd413346b2d2da1b5fae95a348
SHA1 hash:
afbee7ba74ec5b4b415bbb92d96f7d15acd399dd
SH256 hash:
f19af976997ae890019f00bd91b0254ece8b04b193adeae001e4292dac3faf27
MD5 hash:
9ef5f7d398e1054314f49c27b1a18cdb
SHA1 hash:
ab0e493e70b6e04e70d4ba15527e27bad84a6a04
SH256 hash:
86c0b92121e6c732eaa075284a5777b8dacd176d0f8de73e0705afe6ab328e59
MD5 hash:
b051abefe1e23d14a6395e1ae92922c3
SHA1 hash:
7642b2ebbfa357ff02a8224ad39156023f57ae33
SH256 hash:
5361a174e6ad59c3de3883406293400d99547c82d5d6772cf1ec818429487328
MD5 hash:
577cf7f6d1bf28f32bfe33f3c4ae12b2
SHA1 hash:
6733f88e71a336ee5296c3f9a6f81980ae6e2d70
SH256 hash:
d73a933ffe78377a8817e40e3b21d28dd0c46ab462e90e4634c03b1e09a764e6
MD5 hash:
ef618f485bad6aa56f9ab041d744725e
SHA1 hash:
3e2a906c604e9196b3b8cf4911d1b39b337dadb5
SH256 hash:
31819bec7183af670a2441c5590fd6ddeefb826bfc5b461d645f56b017d270c0
MD5 hash:
3daf7f9f1c858b78f089e4e68f4b1e36
SHA1 hash:
3a837b2515e8cb924e953da0df411ca9d5c3e290
SH256 hash:
d8e0e992506dc97af4e4d9a0439c2c6a25569dea8c2b579d5ab44a8a8af5d3a6
MD5 hash:
166da14eb5e486c5b05c1f45b36978e9
SHA1 hash:
330d8e233a97afc1265f64420107e191f6209757
SH256 hash:
9da85faae484a7a1e14627c212e5265d7e8cd141461956478b9b948ba7fac804
MD5 hash:
4f8239ca76f3664887ffe7c50aad57df
SHA1 hash:
2f9193ff47f8ed9876598e5ba3be690ca2c2decc
SH256 hash:
a3cc9db314db8e926a0766135399ef4b0eec066fbc098a47ea1642b3fd062d9e
MD5 hash:
2d51f0c560a502d24b15ccb7673bfd7d
SHA1 hash:
2bbe129931e6428f90c96897e5674e5cc80ccf22
SH256 hash:
5a39c46b2af58a595cf5d008d23f8f0651d7935e2d70806f949e93791e41d449
MD5 hash:
89d8adf19f3e56906f6ae16ea4e94314
SHA1 hash:
23532ac46a3f2406d4b2c39ed17c1c150d42aa52
SH256 hash:
4e92ad7d50e840e121adea7d9502da4f98ca0a9e31c9a96670ec6945fdf07ffa
MD5 hash:
f46c20217976498e6cf885e22120167b
SHA1 hash:
0c1b8c6fe991de00d52a2034958adb7b8a97ec7f
SH256 hash:
ae869add18ecedfd314c4900dc3a6baf75f2e0f700b7b7459c4e67a86cfbba88
MD5 hash:
56f8a81ee557718de32c77eb9928482b
SHA1 hash:
036bb64f7431109b911689f33bd4c563d4b26b33
SH256 hash:
8db41180b01605ba01280a98757c3289f43d88c236aa0dcf7edca7012c307654
MD5 hash:
f1bc25011d94f7ae1deee801323f5293
SHA1 hash:
4b4cf53c9c846bcfafd08c86c2176a16b2a087a2
SH256 hash:
1deea0c54c58f7d959737d9801aabf38d72728b88a88a7d757f8dd03250f9e38
MD5 hash:
041e674050addd3c4aad3ab33988a90c
SHA1 hash:
0eb1cf015188f35cad8f3f86eaabaadad8413b18
SH256 hash:
d890aeafeeac4d6c2d8a1ff8b4d377d9084455a4d46b642da837c05d9b53cdbb
MD5 hash:
0deb4397221634cbffbddcb6829220a6
SHA1 hash:
f499e4c5d81b1490b9380d24b78bd3746b15564d
Malware family:
Sodinokibi
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments