MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dcee48e2f46c8b69a3a5b2b1cae7fb3d26916d3189dc8977fef7aeda3a2ba850. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: dcee48e2f46c8b69a3a5b2b1cae7fb3d26916d3189dc8977fef7aeda3a2ba850
SHA3-384 hash: 2ee31924f9cc645e1c03dc3e6e94676bd4f71430982ba91b6267060e8242d0ddf3d84dc3bb1faef5d7ff923eaefc8dc1
SHA1 hash: 02d646880a3b5724c5e7a7455d2dca1b4f0ab20a
MD5 hash: 37c3d67d7ad57b1c138b1078f6821ef8
humanhash: twelve-video-equal-mountain
File name:6LLq1Biu3Aqcf0n.exe
Download: download sample
File size:816'128 bytes
First seen:2020-10-23 11:52:55 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 12288:S6BVKjy2EkrJP6/QsGD0zj40R8LI6QTvMq/l6I0GqvvcVZBU9rRDlnZzYU:SYVKjy2EkrJPhD0zL8Lj6EqwP0qRZG
Threatray 32 similar samples on MalwareBazaar
TLSH 6005CF0223D89F59F5BF4738A568101057F5BD42AB2BD2ADBDD140DE1CB2B818F16B2B
Reporter abuse_ch
Tags:exe UPS


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: 52.175.253.95
Sending IP: 52.175.253.95
From: "UPS Customer Service" <pkinfo@ups.com>
Subject: UPS - Package Arrival Notification
Attachment: UPS Details.img (contains "6LLq1Biu3Aqcf0n.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
125
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
52 / 100
Signature
.NET source code contains potential unpacker
Binary contains a suspicious time stamp
Machine Learning detection for sample
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 303166 Sample: 6LLq1Biu3Aqcf0n.exe Startdate: 23/10/2020 Architecture: WINDOWS Score: 52 15 .NET source code contains potential unpacker 2->15 17 Machine Learning detection for sample 2->17 19 Binary contains a suspicious time stamp 2->19 7 6LLq1Biu3Aqcf0n.exe 2 12 2->7         started        process3 process4 9 iexplore.exe 1 56 7->9         started        process5 11 iexplore.exe 60 9->11         started        13 iexplore.exe 32 9->13         started       
Threat name:
ByteCode-MSIL.Trojan.Sudloader
Status:
Malicious
First seen:
2020-10-23 11:54:07 UTC
AV detection:
25 of 28 (89.29%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Unpacked files
SH256 hash:
dcee48e2f46c8b69a3a5b2b1cae7fb3d26916d3189dc8977fef7aeda3a2ba850
MD5 hash:
37c3d67d7ad57b1c138b1078f6821ef8
SHA1 hash:
02d646880a3b5724c5e7a7455d2dca1b4f0ab20a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe dcee48e2f46c8b69a3a5b2b1cae7fb3d26916d3189dc8977fef7aeda3a2ba850

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments