MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dd606ae6958876b227db36ee7cb13a25f316810da59ffc2c5d7dc09b4bc2b7dc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: dd606ae6958876b227db36ee7cb13a25f316810da59ffc2c5d7dc09b4bc2b7dc
SHA3-384 hash: 77b5c9626e593a654f38bd1960a21dec5d55575cb9e785a145dcd925213e8a054457a6fb335c06fe372378149cb685cb
SHA1 hash: ec2e35e2baa1bbc6f6f1580f7000b097ff120569
MD5 hash: 709f1e642e5ae9893fa4c95d7a78190c
humanhash: uranus-winner-march-network
File name:chthonic_2.23.17.9.vir
Download: download sample
Signature Chthonic
File size:321'736 bytes
First seen:2020-07-19 19:35:22 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ee1add6409c92350905fe6b6f5ca1eca
ssdeep 3072:LBiUvXgEC1TCrsfPgcdTGWgPHYvAadrpLHQg19X/nzih:Lr/1uTlf4QngfAdrpLZs
TLSH A9645C72B2E51F0AE8E34DB4399888F4CF67BD714761E297124EB22B09343D19661F27
Reporter @tildedennis
Tags:Chthonic


Twitter
@tildedennis
chthonic version 2.23.17.9

Intelligence


File Origin
# of uploads :
1
# of downloads :
18
Origin country :
FR FR
Mail intelligence
No data
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Connection attempt to an infection source
Result
Threat name:
Unknown
Detection:
malicious
Classification:
phis.troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 247398 Sample: chthonic_2.23.17.9.vir Startdate: 20/07/2020 Architecture: WINDOWS Score: 100 120 Antivirus / Scanner detection for submitted sample 2->120 122 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->122 124 Multi AV Scanner detection for submitted file 2->124 126 3 other signatures 2->126 12 chthonic_2.23.17.9.exe 1 2->12         started        17 windowsnt2.com 1 2->17         started        19 windowsnt2.com 1 2->19         started        process3 dnsIp4 114 2.23.17.9 SEABONE-NETTELECOMITALIASPARKLESpAIT European Union 12->114 93 C:\Users\user\AppData\Local\...\4F446BA.tmp, PE32 12->93 dropped 150 Detected unpacking (changes PE section rights) 12->150 152 Detected unpacking (overwrites its own PE header) 12->152 154 Writes to foreign memory regions 12->154 21 msiexec.exe 1 4 12->21         started        25 msiexec.exe 12->25         started        95 C:\Users\user\AppData\Local\...\4B4613D.tmp, PE32 17->95 dropped 27 msiexec.exe 1 17->27         started        30 msiexec.exe 17->30         started        97 C:\Users\user\AppData\Local\...\5252D34.tmp, PE32 19->97 dropped 32 msiexec.exe 1 19->32         started        34 msiexec.exe 19->34         started        file5 signatures6 process7 dnsIp8 79 C:\Users\user\AppData\...\windowsnt2.com, PE32 21->79 dropped 81 C:\Users\user\AppData\Local\Temp\BD09.tmp, PE32 21->81 dropped 130 Creates multiple autostart registry keys 21->130 132 Drops PE files with a suspicious file extension 21->132 134 Deletes itself after installation 21->134 136 Hides that the sample has been downloaded from the Internet (zone.identifier) 21->136 36 cmd.exe 1 21->36         started        108 62.113.203.55, 53 TTMDE Germany 27->108 110 62.113.203.99, 53 TTMDE Germany 27->110 112 5 other IPs or domains 27->112 83 C:\Users\user\AppData\Local\Temp\4B6E.tmp, PE32 27->83 dropped 85 C:\Users\user\AppData\Local\Temp\6167.tmp, PE32 32->85 dropped file9 138 Detected non-DNS traffic on DNS port 110->138 signatures10 process11 process12 38 windowsnt2.com 1 36->38         started        42 conhost.exe 36->42         started        file13 87 C:\Users\user\AppData\Local\...\545501F.tmp, PE32 38->87 dropped 140 Antivirus detection for dropped file 38->140 142 Detected unpacking (changes PE section rights) 38->142 144 Detected unpacking (creates a PE file in dynamic memory) 38->144 146 3 other signatures 38->146 44 msiexec.exe 76 2 38->44         started        49 msiexec.exe 38->49         started        signatures14 process15 dnsIp16 116 163.53.248.170, 53 DIGITALPACIFIC-AUDigitalPacificPtyLtdAustraliaAU Australia 44->116 118 195.154.226.249, 53 OnlineSASFR France 44->118 99 C:\Users\user\AppData\Local\Temp\3B03.tmp, PE32 44->99 dropped 156 Creates an undocumented autostart registry key 44->156 158 Hides the Windows control panel from the task bar 44->158 160 Disables Windows Defender (deletes autostart) 44->160 164 4 other signatures 44->164 51 cmd.exe 1 44->51         started        53 cmd.exe 44->53         started        file17 162 Detected non-DNS traffic on DNS port 116->162 signatures18 process19 process20 55 windowsnt2.com 1 51->55         started        59 conhost.exe 51->59         started        61 windowsnt2.com 53->61         started        63 conhost.exe 53->63         started        file21 89 C:\Users\user\AppData\Local\...\4754AB2.tmp, PE32 55->89 dropped 148 Writes to foreign memory regions 55->148 65 msiexec.exe 2 1 55->65         started        69 msiexec.exe 55->69         started        91 C:\Users\user\AppData\Local\...\4F42D03.tmp, PE32 61->91 dropped 71 msiexec.exe 61->71         started        73 msiexec.exe 61->73         started        signatures22 process23 dnsIp24 101 193.183.98.154, 53 PDDA-ASIT Sweden 65->101 104 5.135.183.146, 53, 58282 OVHFR France 65->104 106 4 other IPs or domains 65->106 75 C:\Users\user\AppData\Local\Temp\D89B.tmp, PE32 65->75 dropped 77 C:\Users\user\AppData\Local\Temp\FD8.tmp, PE32 71->77 dropped file25 128 Detected non-DNS traffic on DNS port 104->128 signatures26
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2018-12-18 20:30:58 UTC
AV detection:
26 of 31 (83.87%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion trojan persistence
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Modifies registry class
Suspicious use of UnmapMainImage
Suspicious behavior: EnumeratesProcesses
System policy modification
Modifies Internet Explorer settings
Modifies service
Adds Run key to start application
Checks whether UAC is enabled
Loads dropped DLL
Deletes itself
Executes dropped EXE
Disables taskbar notifications via registry modification
UAC bypass
Modifies Windows Defender Real-time Protection settings
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments