MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 de9b08a05ea2bbe00ee85225b98ab2c992aa74e1042c678943bb6d786ba35e74. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 14


Intelligence 14 IOCs YARA 13 File information Comments

SHA256 hash: de9b08a05ea2bbe00ee85225b98ab2c992aa74e1042c678943bb6d786ba35e74
SHA3-384 hash: 8cb9d0f15a8de08d3fe23f699f5d6883a1842e64bbce5f0e4c4c252ea92a58019e769fc372a3bc51c8a557b64fb90b02
SHA1 hash: 721c1efb7a89491fb9c0596ab449becceb384b0e
MD5 hash: a9d3902f3eaae2e0325d0de835e34c0d
humanhash: florida-tango-johnny-avocado
File name:SecuriteInfo.com.W32.PossibleThreat.20086.24920
Download: download sample
File size:11'944'851 bytes
First seen:2025-03-07 15:59:18 UTC
Last seen:2025-03-07 17:07:06 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5a594319a0d69dbc452e748bcf05892e (22 x Gh0stRAT, 21 x ParallaxRAT, 15 x NetSupport)
ssdeep 196608:E6OBNfwX6rNMFy0ukCW7wiXalZhnxtUMNPGg5PGYoZog:E6otTMFygdShnxt7hx3lg
TLSH T1ACC6F137F2886D2FC0AB1B354677C2A0A83B766275128D7BA7F8094CCF355506E3E646
TrID 39.3% (.EXE) Inno Setup installer (107240/4/30)
21.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
15.7% (.EXE) InstallShield setup (43053/19/16)
15.2% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
3.8% (.EXE) Win64 Executable (generic) (10522/11/4)
Magika pebin
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter SecuriteInfoCom
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
384
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.W32.PossibleThreat.20086.24920
Verdict:
Malicious activity
Analysis date:
2025-03-07 19:57:27 UTC
Tags:
winscp tool delphi inno installer autoit

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
autoit emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% subdirectories
Moving a file to the %AppData% subdirectory
Creating a file
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
Restart of the analyzed sample
Creating a process with a hidden window
Searching for the window
Setting a single autorun event
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
cmd embarcadero_delphi expand fingerprint installer invalid-signature lolbin overlay packed regsvr32 runonce signed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Allocates memory in foreign processes
Multi AV Scanner detection for submitted file
Submitted sample is a known malware sample
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1632068 Sample: SecuriteInfo.com.W32.Possib... Startdate: 07/03/2025 Architecture: WINDOWS Score: 52 68 Multi AV Scanner detection for submitted file 2->68 10 SecuriteInfo.com.W32.PossibleThreat.20086.24920.exe 2 2->10         started        13 AutoIt3.exe 2->13         started        16 AutoIt3.exe 2->16         started        process3 file4 54 SecuriteInfo.com.W...eat.20086.24920.tmp, PE32 10->54 dropped 18 SecuriteInfo.com.W32.PossibleThreat.20086.24920.tmp 3 15 10->18         started        70 Allocates memory in foreign processes 13->70 21 jsc.exe 13->21         started        23 jsc.exe 16->23         started        signatures5 process6 file7 46 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 18->46 dropped 48 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 18->48 dropped 50 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 18->50 dropped 25 SecuriteInfo.com.W32.PossibleThreat.20086.24920.exe 2 18->25         started        process8 file9 52 SecuriteInfo.com.W...eat.20086.24920.tmp, PE32 25->52 dropped 28 SecuriteInfo.com.W32.PossibleThreat.20086.24920.tmp 5 28 25->28         started        process10 file11 56 C:\Users\user\AppData\...\AutoIt3.exe (copy), PE32 28->56 dropped 58 C:\Users\user\...\mc_dec_aac.dll (copy), PE32+ 28->58 dropped 60 C:\Users\user\AppData\...\is-QQGJR.tmp, PE32+ 28->60 dropped 62 20 other files (none is malicious) 28->62 dropped 72 Submitted sample is a known malware sample 28->72 32 AutoIt3.exe 1 9 28->32         started        signatures12 process13 file14 38 C:\...\AutoIt3.exe, PE32 32->38 dropped 40 C:\...\mc_dec_aac.dll, PE32+ 32->40 dropped 42 C:\...\divx_ssleay32.dll, PE32+ 32->42 dropped 44 3 other files (none is malicious) 32->44 dropped 64 Submitted sample is a known malware sample 32->64 66 Allocates memory in foreign processes 32->66 36 jsc.exe 32->36         started        signatures15 process16
Threat name:
Win32.Spyware.Lummastealer
Status:
Suspicious
First seen:
2025-03-01 18:52:19 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
12 of 38 (31.58%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Unpacked files
SH256 hash:
de9b08a05ea2bbe00ee85225b98ab2c992aa74e1042c678943bb6d786ba35e74
MD5 hash:
a9d3902f3eaae2e0325d0de835e34c0d
SHA1 hash:
721c1efb7a89491fb9c0596ab449becceb384b0e
SH256 hash:
7b6fb0da4088dd29db61d5cfbf1dcd6b81f1a7429a470fc6d9c5f72053d27589
MD5 hash:
4da5d2b0607c70b937599b3b289d73b2
SHA1 hash:
5357420ea5b20584d5b0389f3a0015786497a4d8
Detections:
AutoIT_Compiled
SH256 hash:
4f47ebed7f1d3291bafa3d22f69417b6350e070253c897dbb4de80e53eb73baa
MD5 hash:
804fcbfb0a8e7e11f7bed4d15f47b014
SHA1 hash:
36a55db089b5c59e0db49a65234032ba60c16dcd
SH256 hash:
3abee1616a86857d06a950c319a60b3c77a8285956de5ea34f83bbe2bcae4952
MD5 hash:
68596fdea0881f7cdec74407962ff3bb
SHA1 hash:
bb74d6574e4d4750be4c0d0df829b1d97cd644b2
SH256 hash:
03c2ced3610cf2aea0d84dc0721ecff15230c53dad0abfa5fa6ce934f1bacdba
MD5 hash:
64ed0a358c4a5d732d5dc267554b3b55
SHA1 hash:
bf71a117062384a9a514185ec5ab832014310b11
SH256 hash:
33fa32a6403711af505869913f1b1183da19f198af534936cb8c1aad293b6482
MD5 hash:
5efd55e147d4811f985961693480d587
SHA1 hash:
74c7a783dd48132206d794d0415f96d0bb8c582b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe de9b08a05ea2bbe00ee85225b98ab2c992aa74e1042c678943bb6d786ba35e74

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
SECURITY_BASE_APIUses Security Base APIadvapi32.dll::AdjustTokenPrivileges
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CreateProcessW
advapi32.dll::OpenProcessToken
kernel32.dll::CloseHandle
kernel32.dll::CreateThread
WIN_BASE_APIUses Win Base APIkernel32.dll::LoadLibraryA
kernel32.dll::LoadLibraryExW
kernel32.dll::LoadLibraryW
kernel32.dll::GetSystemInfo
kernel32.dll::GetStartupInfoW
kernel32.dll::GetDiskFreeSpaceW
WIN_BASE_IO_APICan Create Fileskernel32.dll::CreateDirectoryW
kernel32.dll::CreateFileW
kernel32.dll::DeleteFileW
kernel32.dll::GetWindowsDirectoryW
kernel32.dll::GetSystemDirectoryW
kernel32.dll::GetFileAttributesW
WIN_BASE_USER_APIRetrieves Account Informationadvapi32.dll::LookupPrivilegeValueW
WIN_REG_APICan Manipulate Windows Registryadvapi32.dll::RegOpenKeyExW
advapi32.dll::RegQueryValueExW
WIN_USER_APIPerforms GUI Actionsuser32.dll::PeekMessageW
user32.dll::CreateWindowExW

Comments