MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dad93b24ac5ba5c9e9dec5a81ef747ddeeb2164b5359d27d5755b2ee6ef9c5e9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ManusCrypt


Vendor detections: 14


Intelligence 14 IOCs YARA 1 File information Comments

SHA256 hash: dad93b24ac5ba5c9e9dec5a81ef747ddeeb2164b5359d27d5755b2ee6ef9c5e9
SHA3-384 hash: 3c840cb57ad28bc8ecd1b52d531695b86a3213df309ebfaa519c8b3229108953cc1298e19d7bbc0c9790564777141cef
SHA1 hash: c1142c08d91c475d65f9c1af4a14ba86308b4cda
MD5 hash: 2147eaedc94040e2182309464e76a45e
humanhash: may-cold-one-uncle
File name:file
Download: download sample
Signature ManusCrypt
File size:390'081 bytes
First seen:2023-02-09 17:52:00 UTC
Last seen:2023-02-10 12:09:34 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'512 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 6144:x/QiQXCokm+ksmpk3U9j0IxOGBfj/WUplm6zIOYQNd28pTXdAmpCLVRZoglM7Lk0:pQi3oP6m6UR0IxlL//plmW9bTXeVhDrE
Threatray 488 similar samples on MalwareBazaar
TLSH T197841242F3E15839E073CEB06CA0E561893B79254DBC650836ECAD8F9F3B5825296793
TrID 75.1% (.EXE) Inno Setup installer (109740/4/30)
9.7% (.EXE) Win32 Executable Delphi generic (14182/79/4)
4.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.0% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
File icon (PE):PE icon
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter andretavare5
Tags:exe ManusCrypt


Avatar
andretavare5
Sample downloaded from https://s3.eu-west-2.wasabisys.com/crashbach/b1.exe

Intelligence


File Origin
# of uploads :
25
# of downloads :
186
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
luminosity
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-02-09 17:53:08 UTC
Tags:
installer evasion loader sinkhole trojan rat luminosity opendir smoke

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
DNS request
Sending an HTTP GET request
Creating a process with a hidden window
Sending a custom TCP request
Connecting to a non-recommended domain
Sending an HTTP POST request
Creating a file in the Program Files subdirectories
Creating a file
Searching for synchronization primitives
Adding an access-denied ACE
Launching a process
Searching for the browser window
Using the Windows Management Instrumentation requests
Launching cmd.exe command interpreter
Unauthorized injection to a recently created process
Query of malicious DNS domain
Sending a TCP request to an infection source
Setting a single autorun event
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware installer overlay packed shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates HTML files with .exe extension (expired dropper behavior)
Detected VMProtect packer
Drops executable to a common third party application directory
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Obfuscated command line found
Snort IDS alert for network traffic
Yara detected Generic Downloader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 803120 Sample: file.exe Startdate: 09/02/2023 Architecture: WINDOWS Score: 100 86 htagzdownload.pw 2->86 88 xv.yxzgamen.com 2->88 90 29 other IPs or domains 2->90 112 Snort IDS alert for network traffic 2->112 114 Multi AV Scanner detection for domain / URL 2->114 116 Antivirus detection for URL or domain 2->116 118 9 other signatures 2->118 11 file.exe 2 2->11         started        15 Vokyjacysi.exe 2->15         started        17 Vokyjacysi.exe 2->17         started        signatures3 process4 file5 76 C:\Users\user\AppData\Local\Temp\...\file.tmp, PE32 11->76 dropped 124 Obfuscated command line found 11->124 19 file.tmp 3 19 11->19         started        signatures6 process7 dnsIp8 92 130.117.252.35, 49695, 80 BLUEARCHIVE-ZONE-1US United States 19->92 94 s3.eu-central-1.wasabisys.com 19->94 60 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 19->60 dropped 62 C:\Users\user\AppData\Local\Temp\...\TEST.exe, PE32 19->62 dropped 64 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 19->64 dropped 66 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 19->66 dropped 23 TEST.exe 22 18 19->23         started        file9 process10 dnsIp11 98 connectini.net 37.230.138.123, 443, 49696, 49704 ROCKETTELECOM-ASRU Russian Federation 23->98 100 360devtracking.com 37.230.138.66, 49703, 49711, 80 ROCKETTELECOM-ASRU Russian Federation 23->100 102 5 other IPs or domains 23->102 68 C:\Users\user\AppData\...\Wofucaegege.exe, PE32 23->68 dropped 70 C:\Users\user\AppData\...\Lujuvufuly.exe, PE32 23->70 dropped 72 C:\Program Files (x86)\...\Vokyjacysi.exe, PE32 23->72 dropped 74 3 other malicious files 23->74 dropped 120 Machine Learning detection for dropped file 23->120 122 Drops executable to a common third party application directory 23->122 28 Wofucaegege.exe 14 4 23->28         started        33 Lujuvufuly.exe 14 17 23->33         started        file12 signatures13 process14 dnsIp15 104 google.com 142.251.209.14 GOOGLEUS United States 28->104 106 connectini.net 28->106 78 C:\Users\user\AppData\Local\...\gcleaner.exe, PE32 28->78 dropped 80 C:\Users\user\AppData\...\ChromeSetup.exe, PE32 28->80 dropped 82 C:\Users\user\AppData\Local\...\chenp.exe, PE32 28->82 dropped 84 2 other malicious files 28->84 dropped 126 Antivirus detection for dropped file 28->126 128 Creates HTML files with .exe extension (expired dropper behavior) 28->128 130 Machine Learning detection for dropped file 28->130 108 www.google.com 142.250.184.100, 49705, 80 GOOGLEUS United States 33->108 110 connectini.net 33->110 35 chrome.exe 33->35         started        38 chrome.exe 33->38         started        40 chrome.exe 33->40         started        42 48 other processes 33->42 file16 signatures17 process18 dnsIp19 96 192.168.2.1 unknown unknown 35->96 44 chrome.exe 35->44         started        46 chrome.exe 35->46         started        48 chrome.exe 38->48         started        50 chrome.exe 40->50         started        52 chrome.exe 42->52         started        54 chrome.exe 42->54         started        56 chrome.exe 42->56         started        58 7 other processes 42->58 process20
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2023-02-09 16:25:18 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
17 of 26 (65.38%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:gcleaner family:vidar evasion loader persistence stealer vmprotect
Behaviour
Checks processor information in registry
Kills process with taskkill
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Script User-Agent
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of SetThreadContext
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Executes dropped EXE
Loads dropped DLL
Unexpected DNS network traffic destination
VMProtect packed file
Downloads MZ/PE file
Drops file in Drivers directory
Checks for common network interception software
GCleaner
Process spawned unexpected child process
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Unpacked files
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
8188ab7fe705b86c9aa6f369d1098c47bb2422ad6cc8c114aaa3ba36e6ce53b9
MD5 hash:
8e99f9f67c165a6b5c47693cc6249395
SHA1 hash:
5d971a119f9ebb46ebe3b7effb483fa393c0d2c7
SH256 hash:
dad93b24ac5ba5c9e9dec5a81ef747ddeeb2164b5359d27d5755b2ee6ef9c5e9
MD5 hash:
2147eaedc94040e2182309464e76a45e
SHA1 hash:
c1142c08d91c475d65f9c1af4a14ba86308b4cda
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments