MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dc4f19e5e4dc8fcc3c4ef23408bb2786351dbc4c6d68fd8f882bcbdf52211ff3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 3 File information Comments

SHA256 hash: dc4f19e5e4dc8fcc3c4ef23408bb2786351dbc4c6d68fd8f882bcbdf52211ff3
SHA3-384 hash: 391cd5e345e2e16384935df6f760ae8c250a7714f113a099633227f5199c3eaf7c2440442f9d9b9f5e12dd441f8499dc
SHA1 hash: 9a7bce39762a8b63f816e4887fad01c918714035
MD5 hash: ad4fcf6799d34bf9ef0b20df24ae5879
humanhash: berlin-oranges-pip-cola
File name:rave.exe
Download: download sample
File size:5'785'067 bytes
First seen:2023-06-19 13:34:42 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 1ff847646487d56f85778df99ff3728a (4 x RedLineStealer, 3 x Nitol, 2 x Gh0stRAT)
ssdeep 98304:O06FOznLo0+Dd6uxc1XsVXsRGPyYY+o1Eol+7qB9owP6IL4X9+wczwSFaFyFQjle:O3F6n80W6uG18V8RzYtoU76P6w69K8sf
Threatray 23 similar samples on MalwareBazaar
TLSH T176463345F683C4B0E8B600F9456687B15A7ABD318369D4F3AF907C2E9E703D1D632A4E
TrID 68.0% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
10.7% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
9.1% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4)
3.6% (.EXE) Win64 Executable (generic) (10523/12/4)
2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon fadadac2a2b8c4e4 (11 x Nitol, 2 x Amadey, 2 x AgentTesla)
Reporter obfusor
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
303
Origin country :
HK HK
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
青岛可隆车业有限公司.eml
Verdict:
Malicious activity
Analysis date:
2023-06-15 05:32:08 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file
Creating a file in the Program Files subdirectories
Creating a file in the %AppData% subdirectories
Creating a process with a hidden window
Sending a custom TCP request
DNS request
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Creating a window
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionQueryPerformanceCounter
EvasionGetTickCount
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware lolbin obfuscated overlay packed shell32.dll
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
clean
Classification:
evad
Score:
15 / 100
Behaviour
Behavior Graph:
n/a
Result
Malware family:
n/a
Score:
  7/10
Tags:
upx
Behaviour
Checks processor information in registry
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
ACProtect 1.3x - 1.4x DLL software
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
UPX packed file
Unpacked files
SH256 hash:
19bef29a1137a6e18001077ea1da3d1cbfa155d3c43c230a0c8ef3826884c44c
MD5 hash:
a843f6e52667f5c840ac41c4bcbe42be
SHA1 hash:
8816c7c0cc5f260489cbf98c59c8ddcd5eaae961
SH256 hash:
dc4f19e5e4dc8fcc3c4ef23408bb2786351dbc4c6d68fd8f882bcbdf52211ff3
MD5 hash:
ad4fcf6799d34bf9ef0b20df24ae5879
SHA1 hash:
9a7bce39762a8b63f816e4887fad01c918714035
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:QbotStuff
Author:anonymous

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments