MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 db3dec6fc542d0d1e7e00233812984c3698a54bcc2a4d124e0a7075794e162c5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: db3dec6fc542d0d1e7e00233812984c3698a54bcc2a4d124e0a7075794e162c5
SHA3-384 hash: 6715347dc00210bfa3fe3cdb97f48005d79b74aaf8a01c9e08e34efb48a4bfea7d6294a90bcb313691a608be8cb2d552
SHA1 hash: dfd25b81a7e62ff2499f04e737470996871b2cfc
MD5 hash: 4e2dc880aa036e46bdada8450d25d622
humanhash: twenty-tango-neptune-sierra
File name:9999.bin
Download: download sample
File size:3'324'488 bytes
First seen:2022-06-14 14:46:49 UTC
Last seen:2022-06-14 15:47:57 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c6e51dda1622035b42b177c9afe67c30
ssdeep 49152:yEbj+GhlIBvuP6aiJr23GtaIZLsQOVwB3chxhHc20ywhVIq9mmada1iNRtfX:ye/hl8WP4B2WoUsQOqB6L6VZ9KwiNRtv
Threatray 23 similar samples on MalwareBazaar
TLSH T13DF5338877D254F6EAE6F5309F81C4BA57D05C2A98104837A6F47E1FBAFF88F1918406
TrID 44.6% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
23.6% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
9.4% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.4% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer)
Reporter obfusor
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
259
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
9999.exe
Verdict:
Malicious activity
Analysis date:
2022-06-10 04:19:54 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Launching a process
Creating a file in the %temp% directory
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Changing a file
Сreating synchronization primitives
Searching for synchronization primitives
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug anti-vm overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
n/a
Score:
25 / 100
Signature
Java source code contains very large array initializations
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 645522 Sample: 9999.bin Startdate: 14/06/2022 Architecture: WINDOWS Score: 25 19 Java source code contains very large array initializations 2->19 8 9999.exe 2->8         started        process3 process4 10 javaw.exe 33 8->10         started        dnsIp5 17 192.168.2.1 unknown unknown 10->17 13 icacls.exe 1 10->13         started        process6 process7 15 conhost.exe 13->15         started       
Threat name:
Win32.Infostealer.Generic
Status:
Suspicious
First seen:
2022-06-10 07:32:51 UTC
File Type:
PE (Exe)
Extracted files:
1670
AV detection:
3 of 26 (11.54%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
ransomware
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Sets desktop wallpaper using registry
Loads dropped DLL
Unpacked files
SH256 hash:
db3dec6fc542d0d1e7e00233812984c3698a54bcc2a4d124e0a7075794e162c5
MD5 hash:
4e2dc880aa036e46bdada8450d25d622
SHA1 hash:
dfd25b81a7e62ff2499f04e737470996871b2cfc
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments