MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d8f3d5f017e6385d2c47dc3ca86a789897f62ce18e13441e0f8c7e40a307b3d3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cutwail


Vendor detections: 14


Intelligence 14 IOCs YARA 6 File information Comments 1

SHA256 hash: d8f3d5f017e6385d2c47dc3ca86a789897f62ce18e13441e0f8c7e40a307b3d3
SHA3-384 hash: 25d5a99d33087d358992ea56e848a2794a5711f29bd7660f776a4775a6c62bc634df274e69d5b4e7a13f3fce81647b72
SHA1 hash: fef7bf275e1890955dd600c077e26395cb7572ad
MD5 hash: 4c321e07bba6c01aab73acdaa9c28b52
humanhash: nevada-oven-johnny-lima
File name:4c321e07bba6c01aab73acdaa9c28b52
Download: download sample
Signature Cutwail
File size:263'680 bytes
First seen:2023-10-12 15:27:31 UTC
Last seen:2023-10-12 17:33:08 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash af12234af619433f7afc42505a54121f (1 x Cutwail)
ssdeep 6144:TN4A+yThsOA6G3X7W6e56qqFa5I/mmmmmmm6x4hX11r1f:xlhThxKrdQCkgenr1f
Threatray 23 similar samples on MalwareBazaar
TLSH T1CF44DF02F6E25F63C563543700B29575F93FA9691B19CE673388C76A18263809F73B2E
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4505/5/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter zbetcheckin
Tags:32 Cutwail exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
305
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
4c321e07bba6c01aab73acdaa9c28b52
Verdict:
Malicious activity
Analysis date:
2023-10-12 15:28:05 UTC
Tags:
pushdo cutwail backdoor sinkhole opendir

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% subdirectories
Сreating synchronization primitives
Creating a file
Enabling the 'hidden' option for recently created files
DNS request
Sending an HTTP POST request
Launching a process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
cutwail greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre.troj.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
DNS related to crypt mining pools
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Opens the same file many times (likely Sandbox evasion)
Performs DNS queries to domains with low reputation
Send many emails (e-Mail Spam)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to resolve many domain names, but no domain seems valid
Uses dynamic DNS services
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1324805 Sample: x7RlIzQDk1.exe Startdate: 12/10/2023 Architecture: WINDOWS Score: 100 73 zonedeux.com 2->73 75 zimmerei-hoffmann.de 2->75 77 1571 other IPs or domains 2->77 103 Snort IDS alert for network traffic 2->103 105 Antivirus detection for URL or domain 2->105 107 Antivirus / Scanner detection for submitted sample 2->107 111 7 other signatures 2->111 8 x7RlIzQDk1.exe 3 68 2->8         started        13 pigalicapi.exe 48 2->13         started        15 pigalicapi.exe 48 2->15         started        signatures3 109 System process connects to network (likely due to code injection or exploit) 75->109 process4 dnsIp5 79 bobbyjackbrand-com.inbound.emailservice.io 8->79 81 172.67.184.30 CLOUDFLARENETUS United States 8->81 87 53 other IPs or domains 8->87 53 C:\Users\user\pigalicapi.exe, PE32 8->53 dropped 113 Drops PE files to the user root directory 8->113 115 Writes to foreign memory regions 8->115 117 Allocates memory in foreign processes 8->117 17 svchost.exe 8->17         started        21 svchost.exe 8->21         started        23 svchost.exe 8->23         started        83 ymlp15.net 13->83 85 oilpackers.com 13->85 89 22 other IPs or domains 13->89 119 Antivirus detection for dropped file 13->119 121 Multi AV Scanner detection for dropped file 13->121 123 Machine Learning detection for dropped file 13->123 25 svchost.exe 13->25         started        27 svchost.exe 13->27         started        91 17 other IPs or domains 15->91 125 Injects a PE file into a foreign processes 15->125 29 svchost.exe 15->29         started        31 svchost.exe 15->31         started        file6 127 System process connects to network (likely due to code injection or exploit) 83->127 129 Tries to resolve many domain names, but no domain seems valid 85->129 signatures7 process8 dnsIp9 55 142.251.2.26 GOOGLEUS United States 17->55 93 System process connects to network (likely due to code injection or exploit) 17->93 95 Performs DNS queries to domains with low reputation 17->95 97 Injects a PE file into a foreign processes 17->97 33 svchost.exe 17->33         started        37 svchost.exe 17->37         started        47 2 other processes 17->47 49 4 other processes 21->49 57 mail.airmail.net 66.226.70.66 INFB2-ASUS United States 25->57 39 svchost.exe 25->39         started        41 svchost.exe 12 25->41         started        43 svchost.exe 12 25->43         started        45 svchost.exe 1 12 25->45         started        51 4 other processes 29->51 signatures10 process11 dnsIp12 59 28 other IPs or domains 33->59 61 19 other IPs or domains 37->61 63 1938 other IPs or domains 39->63 99 System process connects to network (likely due to code injection or exploit) 39->99 101 Opens the same file many times (likely Sandbox evasion) 39->101 65 30 other IPs or domains 41->65 67 44 other IPs or domains 43->67 69 28 other IPs or domains 45->69 71 41 other IPs or domains 47->71 signatures13
Threat name:
Win32.Trojan.Smokeloader
Status:
Malicious
First seen:
2023-10-12 15:28:06 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
persistence upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
UPX packed file
Unpacked files
SH256 hash:
f812cff25ac78391ad0621231aa8556d459a3cea3205a04b097744f1e0116a60
MD5 hash:
ab0fa68fdf4a67b3a404250f073e15ba
SHA1 hash:
7eb499acfbe7a3d4d536ab2de8e95be4d7234bbf
SH256 hash:
bc8268e6e9cd17848414f3edfc4a5907b4500211ec3b8182a9c0213e19bf4258
MD5 hash:
1f9630e66cae80d72aa99d79305f20b6
SHA1 hash:
a601b2fbb34bdb461d8976a569315dc89fa63a0e
Detections:
pushdo win_pushdo_auto
SH256 hash:
d8f3d5f017e6385d2c47dc3ca86a789897f62ce18e13441e0f8c7e40a307b3d3
MD5 hash:
4c321e07bba6c01aab73acdaa9c28b52
SHA1 hash:
fef7bf275e1890955dd600c077e26395cb7572ad
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:win_pushdo_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.pushdo.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Cutwail

Executable exe d8f3d5f017e6385d2c47dc3ca86a789897f62ce18e13441e0f8c7e40a307b3d3

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-10-12 15:27:32 UTC

url : hxxp://193.142.59.12/myblog/posts/191.exe