MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d8a0ad3d3b54d49dea84a6ac1d38082c5ba246d13c9060543cff213fc3dc5260. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: d8a0ad3d3b54d49dea84a6ac1d38082c5ba246d13c9060543cff213fc3dc5260
SHA3-384 hash: 864ac6d99c8d389b8c533fcbdd428ee40e4b49853e3a70420d9bd68c0e2cd99502ef9461c075b8addd1dba1809f5df5a
SHA1 hash: 3c5557d9803917456c658697de72e42ab4cbe7a4
MD5 hash: 67d54f57e181e0d4c9d4c40d1c865cde
humanhash: solar-ink-winner-virginia
File name:Discord IP Puller - Linkvertise Downloader_f-ojpo1.exe
Download: download sample
File size:2'705'872 bytes
First seen:2021-10-21 22:35:59 UTC
Last seen:2021-10-22 00:08:43 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5a594319a0d69dbc452e748bcf05892e (21 x ParallaxRAT, 20 x Gh0stRAT, 15 x NetSupport)
ssdeep 49152:6qe3f6atzD7+H98AHaCfu60WgHCL+WuTmuKwES:TSiwD7E9vButWgHCK5NKXS
Threatray 155 similar samples on MalwareBazaar
TLSH T1C7C5D03FB2EA6D7EC47A0A394572929858376E70641A8CDA07FC250DCF27460BE3B715
File icon (PE):PE icon
dhash icon f87cb68aca92c9c8 (1 x Adware.Generic, 1 x Sality)
Reporter JaffaCakes118
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
142
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://bit.ly/3b9r1ww
Verdict:
Malicious activity
Analysis date:
2021-10-21 00:22:47 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed virus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
evad
Score:
28 / 100
Signature
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 507330 Sample: Discord IP Puller - Linkver... Startdate: 22/10/2021 Architecture: WINDOWS Score: 28 93 Multi AV Scanner detection for submitted file 2->93 8 Discord IP Puller - Linkvertise Downloader_f-ojpo1.exe 2 2->8         started        11 msiexec.exe 25 2->11         started        process3 file4 51 Discord IP Puller ...nloader_f-ojpo1.tmp, PE32 8->51 dropped 13 Discord IP Puller - Linkvertise Downloader_f-ojpo1.tmp 9 41 8->13         started        53 C:\Windows\Installer\MSIFAFE.tmp, PE32+ 11->53 dropped 55 C:\Windows\Installer\MSIFA03.tmp, PE32+ 11->55 dropped 57 C:\Windows\Installer\MSIF80E.tmp, PE32+ 11->57 dropped 59 12 other files (none is malicious) 11->59 dropped 17 msiexec.exe 11->17         started        19 msiexec.exe 11->19         started        process5 dnsIp6 87 18.66.107.143 MIT-GATEWAYSUS United States 13->87 89 18.66.107.151 MIT-GATEWAYSUS United States 13->89 91 4 other IPs or domains 13->91 61 C:\Users\user\AppData\...\ccsetup583_slim.exe, PE32 13->61 dropped 63 C:\Users\user\AppData\...\zbShieldUtils.dll, PE32 13->63 dropped 65 C:\Users\user\AppData\Local\...\botva2.dll, PE32 13->65 dropped 67 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 13->67 dropped 21 ccsetup583_slim.exe 39 92 13->21         started        26 chrome.exe 10 38 13->26         started        28 msiexec.exe 1 13->28         started        69 C:\Users\user\AppData\Local\...\CloseFAH.exe, PE32 17->69 dropped 30 CloseFAH.exe 17->30         started        file7 process8 dnsIp9 77 151.101.0.64 FASTLYUS United States 21->77 79 5.62.40.212 AVAST-AS-DCCZ United Kingdom 21->79 85 3 other IPs or domains 21->85 43 C:\Users\user\AppData\Local\Temp\...\pfBL.dll, PE32 21->43 dropped 45 C:\Users\user\AppData\Local\...\nsProcess.dll, PE32 21->45 dropped 47 C:\Users\user\AppData\Local\...\inetc.dll, PE32 21->47 dropped 49 66 other files (none is malicious) 21->49 dropped 95 Query firmware table information (likely to detect VMs) 21->95 97 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 21->97 81 192.168.2.6 unknown unknown 26->81 83 239.255.255.250 unknown Reserved 26->83 32 chrome.exe 26->32         started        35 chrome.exe 26->35 injected 37 chrome.exe 26->37 injected 41 7 other processes 26->41 39 conhost.exe 30->39         started        file10 signatures11 process12 dnsIp13 71 35.83.229.244 MERIT-AS-14US United States 32->71 73 142.250.203.109 GOOGLEUS United States 32->73 75 14 other IPs or domains 32->75
Threat name:
Win32.Downloader.Bundler
Status:
Malicious
First seen:
2021-10-20 08:12:29 UTC
AV detection:
9 of 28 (32.14%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies system certificate store
Script User-Agent
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
8dc40627fa4c09f7fd6df78e3ad03d7db3767010e15418dba24e63754dcbc59b
MD5 hash:
74fad5c6cd2d3af1fa257b5e9531993a
SHA1 hash:
ab701031918456195cf9a12a8b33f9417a9f6496
SH256 hash:
d8a0ad3d3b54d49dea84a6ac1d38082c5ba246d13c9060543cff213fc3dc5260
MD5 hash:
67d54f57e181e0d4c9d4c40d1c865cde
SHA1 hash:
3c5557d9803917456c658697de72e42ab4cbe7a4
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe d8a0ad3d3b54d49dea84a6ac1d38082c5ba246d13c9060543cff213fc3dc5260

(this sample)

  
Delivery method
Distributed via web download

Comments