MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dcbd52a4afec7b4c2269106bd4ca25731d940e22170e67ae0d4850d127e4ace2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments 1

SHA256 hash: dcbd52a4afec7b4c2269106bd4ca25731d940e22170e67ae0d4850d127e4ace2
SHA3-384 hash: f5d75de833d3875516990aceaf27cf16be7565493d578a72196d4b03e40ae895dd152b9b2e569c0de33004b51ba8c1c5
SHA1 hash: f85dfd060e6db3277e3e344b2134555afb0cbfb1
MD5 hash: 079a8d62311c2fa1e25cd4be46a2b21e
humanhash: twenty-leopard-lake-floor
File name:079a8d62311c2fa1e25cd4be46a2b21e
Download: download sample
File size:7'208'464 bytes
First seen:2022-08-17 07:16:18 UTC
Last seen:2022-08-17 10:36:57 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 0ffc1493a2cf737772190833e575ee1e
ssdeep 98304:ekuGB7m794+gRH9vzXVneHTfLXHEuVpSzSPdjkB7H6bwEcS8jjH2yRPaXEb5O5kp:OGe4+m1XVn6D3EuGGdj8apcpCyxto5kp
Threatray 3'112 similar samples on MalwareBazaar
TLSH T1BB7633AA497AAECEC1AB82735C364649A51CFC634D311D55F01F9EE042E103F2FF6A25
TrID 29.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
20.3% (.EXE) Win32 Executable (generic) (4505/5/1)
13.5% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
9.3% (.EXE) Win16/32 Executable Delphi generic (2072/23)
9.1% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon f0c4b27139b2e4e8 (3 x PythonStealer, 2 x RemoteManipulator, 1 x DRAT)
Reporter zbetcheckin
Tags:32 exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
251
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
079a8d62311c2fa1e25cd4be46a2b21e
Verdict:
Suspicious activity
Analysis date:
2022-08-17 07:32:01 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Searching for analyzing tools
Searching for the window
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
68 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Ghoul
Status:
Malicious
First seen:
2022-08-17 07:17:20 UTC
File Type:
PE (Exe)
Extracted files:
10
AV detection:
18 of 26 (69.23%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
evasion trojan
Behaviour
Checks whether UAC is enabled
Checks BIOS information in registry
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Unpacked files
SH256 hash:
cbef1de4419cb6cc7b3d47b8499b130da9cdfbb832f4cb42e76c32d05e195040
MD5 hash:
bf4247e5d89f1e195ff35490fa21f823
SHA1 hash:
e7d80a7eee081f98b52126ed30ac8947bc6379a6
SH256 hash:
dcbd52a4afec7b4c2269106bd4ca25731d940e22170e67ae0d4850d127e4ace2
MD5 hash:
079a8d62311c2fa1e25cd4be46a2b21e
SHA1 hash:
f85dfd060e6db3277e3e344b2134555afb0cbfb1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:INDICATOR_EXE_Packed_Themida
Author:ditekSHen
Description:Detects executables packed with Themida

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe dcbd52a4afec7b4c2269106bd4ca25731d940e22170e67ae0d4850d127e4ace2

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-08-17 07:16:37 UTC

url : hxxp://109.206.241.81/htdocs/GyEqC.exe