MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 df116f3585f1fe4b00c351a2941f6b85565e1fcc6da5569c6f7c80ddd1b4e2a8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: df116f3585f1fe4b00c351a2941f6b85565e1fcc6da5569c6f7c80ddd1b4e2a8
SHA3-384 hash: d686349f4c91a7f1530ef18cc214c2e8ac775ee8a22c72a636f67b6876c44d439276194151c71ec522caf849d6e2dc7a
SHA1 hash: 712fe21354098f3764f6e9cbe7b57dc67a65c478
MD5 hash: 7e7012645cc3d6d3572bb01891fbcec1
humanhash: golf-golf-tango-idaho
File name:7e7012645cc3d6d3572bb01891fbcec1.exe
Download: download sample
File size:1'338'284 bytes
First seen:2021-04-08 08:20:39 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a1a66d588dcf1394354ebf6ec400c223 (49 x RedLineStealer, 7 x CryptBot, 4 x AZORult)
ssdeep 24576:453uhFDHfQS65sxmN8CaEDtRcQv6sQVoRdJXUZCiF0YqlX7xpMyNIeFKtc8GCcm:45+hFDHOoGDvcC7UnF079pjOeYt3cm
Threatray 112 similar samples on MalwareBazaar
TLSH D95523257BE851FAC5C774739D04BB71ABF6EB20274405E7CB601E0AAD0B2E67A3D081
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
104
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
7e7012645cc3d6d3572bb01891fbcec1.exe
Verdict:
Malicious activity
Analysis date:
2021-04-08 08:33:15 UTC
Tags:
autoit

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Creating a file in the %AppData% subdirectories
Launching a process
Creating a process with a hidden window
Running batch commands
Launching cmd.exe command interpreter
Creating a process from a recently created file
DNS request
Deleting a recently created file
Searching for the window
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Contains functionality to register a low level keyboard hook
Creates processes via WMI
Drops PE files with a suspicious file extension
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Obfuscated command line found
Sigma detected: Drops script at startup location
Submitted sample is a known malware sample
Tries to harvest and steal browser information (history, passwords, etc)
Uses nslookup.exe to query domains
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 383838 Sample: WDnE51mua6.exe Startdate: 08/04/2021 Architecture: WINDOWS Score: 100 79 Antivirus detection for URL or domain 2->79 81 Multi AV Scanner detection for submitted file 2->81 83 Sigma detected: Drops script at startup location 2->83 85 Machine Learning detection for sample 2->85 10 WDnE51mua6.exe 7 2->10         started        13 juROhmfLml.exe.com 2->13         started        16 wscript.exe 2->16         started        process3 dnsIp4 101 Contains functionality to register a low level keyboard hook 10->101 18 cmd.exe 1 10->18         started        21 svchost.exe 10->21         started        77 zjZFqZYoOtpryMyR.zjZFqZYoOtpryMyR 13->77 103 Uses nslookup.exe to query domains 13->103 105 Writes to foreign memory regions 13->105 107 Injects a PE file into a foreign processes 13->107 23 nslookup.exe 21 13->23         started        109 Creates processes via WMI 16->109 signatures5 process6 dnsIp7 87 Submitted sample is a known malware sample 18->87 89 Obfuscated command line found 18->89 91 Uses ping.exe to sleep 18->91 93 Uses ping.exe to check the status of other devices and networks 18->93 26 cmd.exe 3 18->26         started        29 conhost.exe 18->29         started        69 banusdoret.top 8.208.95.18, 443, 49730, 49736 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC Singapore 23->69 95 Tries to harvest and steal browser information (history, passwords, etc) 23->95 31 cmd.exe 1 23->31         started        33 cmd.exe 1 23->33         started        35 cmd.exe 1 23->35         started        signatures8 process9 signatures10 111 Obfuscated command line found 26->111 113 Uses ping.exe to sleep 26->113 37 Gia.exe.com 26->37         started        40 PING.EXE 1 26->40         started        43 findstr.exe 1 26->43         started        46 WMIC.exe 1 31->46         started        48 conhost.exe 31->48         started        50 makecab.exe 11 33->50         started        52 conhost.exe 33->52         started        54 conhost.exe 35->54         started        process11 dnsIp12 97 Drops PE files with a suspicious file extension 37->97 99 Uses nslookup.exe to query domains 37->99 56 Gia.exe.com 6 37->56         started        71 127.0.0.1 unknown unknown 40->71 73 192.168.2.1 unknown unknown 40->73 67 C:\Users\user\AppData\Roaming\...behaviorgraphia.exe.com, Targa 43->67 dropped file13 signatures14 process15 dnsIp16 75 zjZFqZYoOtpryMyR.zjZFqZYoOtpryMyR 56->75 63 C:\Users\user\AppData\...\juROhmfLml.exe.com, PE32 56->63 dropped 65 C:\Users\user\AppData\...\juROhmfLml.url, MS 56->65 dropped 115 Uses nslookup.exe to query domains 56->115 117 Writes to foreign memory regions 56->117 119 Injects a PE file into a foreign processes 56->119 61 nslookup.exe 56->61         started        file17 signatures18 process19
Threat name:
Win32.Trojan.Crypzip
Status:
Malicious
First seen:
2021-03-24 22:20:10 UTC
AV detection:
31 of 48 (64.58%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Drops startup file
Loads dropped DLL
Executes dropped EXE
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
46c9acd8001fcecb1590452076839cde8f106a56671bc365411808e1db2bc910
MD5 hash:
d553472088f9a343e8b1028864712fe8
SHA1 hash:
86eee40735de21ada11b3e6a22bffa2d314dfe2a
SH256 hash:
d3c16112a56249d394c34134e71a6860fba98098f013a84557ba6159e18973d8
MD5 hash:
826f97c7a24ccc418601f78c35ea1f8b
SHA1 hash:
a23ac15198ead14b2040f248ce0335561f65d133
SH256 hash:
df116f3585f1fe4b00c351a2941f6b85565e1fcc6da5569c6f7c80ddd1b4e2a8
MD5 hash:
7e7012645cc3d6d3572bb01891fbcec1
SHA1 hash:
712fe21354098f3764f6e9cbe7b57dc67a65c478
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe df116f3585f1fe4b00c351a2941f6b85565e1fcc6da5569c6f7c80ddd1b4e2a8

(this sample)

  
Delivery method
Distributed via web download

Comments