MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dc2f3e80808f0c446678db8d3efef0467262a63854accadec41a2a025c553fad. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: dc2f3e80808f0c446678db8d3efef0467262a63854accadec41a2a025c553fad
SHA3-384 hash: 54bffb01427ff4ea59a5959c429bb9409d6d1c9a32e2ca22557159081df336ac7b8288958c36e8a1e527ae4c56708854
SHA1 hash: 33d9bad272ab94f7fcc558c0c3a2c1ea6e82fbe5
MD5 hash: f1156ef3ac6a083574de9dfe3185f43e
humanhash: artist-emma-illinois-july
File name:vcruntime140.dll
Download: download sample
File size:5'988'864 bytes
First seen:2024-01-23 21:30:31 UTC
Last seen:2024-01-23 23:28:23 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 5e5ac8ab7be27ac2d1c548e5589378b6 (11 x GuLoader, 6 x Stealc, 5 x RedLineStealer)
ssdeep 98304:7NG6IFyPIV5vbbm//zjLjICmgU/w2u5c3kYkZJL5ACcI1FQX:PInm/bPcC9U/7u2gJL5rfbU
TLSH T1E856332307ECA22CF167937DAD2564C0B99D75798E32FDA79336962D5E00C02C1F6A39
TrID 34.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
23.4% (.EXE) Win32 Executable (generic) (4505/5/1)
10.7% (.EXE) Win16/32 Executable Delphi generic (2072/23)
10.5% (.EXE) OS/2 Executable (generic) (2029/13)
10.4% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter FXOLabs
Tags:dll

Intelligence


File Origin
# of uploads :
2
# of downloads :
332
Origin country :
BR BR
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for the window
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
enigma lolbin packed packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
64 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
PE file has nameless sections
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1379885 Sample: vcruntime140.dll Startdate: 23/01/2024 Architecture: WINDOWS Score: 64 24 Antivirus / Scanner detection for submitted sample 2->24 26 Multi AV Scanner detection for submitted file 2->26 28 Machine Learning detection for sample 2->28 30 PE file has nameless sections 2->30 8 loaddll32.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 rundll32.exe 8->12         started        14 rundll32.exe 8->14         started        16 16 other processes 8->16 process5 18 rundll32.exe 10->18         started        20 WerFault.exe 12->20         started        process6 22 WerFault.exe 22 16 18->22         started       
Threat name:
Win32.Trojan.BankerX
Status:
Malicious
First seen:
2024-01-23 21:16:09 UTC
File Type:
PE (Dll)
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Program crash
Unpacked files
SH256 hash:
dc2f3e80808f0c446678db8d3efef0467262a63854accadec41a2a025c553fad
MD5 hash:
f1156ef3ac6a083574de9dfe3185f43e
SHA1 hash:
33d9bad272ab94f7fcc558c0c3a2c1ea6e82fbe5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments