MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dfde4df8173b90daa38575d60c96bfc157e045a04e16e46bf073a64fdfd1285e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cutwail


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments 1

SHA256 hash: dfde4df8173b90daa38575d60c96bfc157e045a04e16e46bf073a64fdfd1285e
SHA3-384 hash: ace7aad481a6cbc60dc50a650025e5559b698bcaf98fa5b6d1090abf0aa766f77057dcce7219d3c2d25f0e8911f37e13
SHA1 hash: f1098d33d3fe81e370ea1d75096f51d3bebcd855
MD5 hash: 113ac743212e56ac38d22182d7b38385
humanhash: spring-idaho-maryland-batman
File name:113ac743212e56ac38d22182d7b38385
Download: download sample
Signature Cutwail
File size:201'216 bytes
First seen:2022-06-09 02:41:45 UTC
Last seen:2022-06-09 03:39:24 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 087bf393c3e80bbcc2dfcd158b7f60e8 (1 x Cutwail)
ssdeep 3072:MCUHk3oEnyRc2Cso5TxUn4UOhz9Whjw2:MC4EntRpDU4PhRYw2
Threatray 7 similar samples on MalwareBazaar
TLSH T10714AE31B3F1C036E1B36A30547596A11A7BBC126674818F1BA41F7A6F20BC09F7A767
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 5c59da3ce0c1c850 (36 x Stop, 33 x Smoke Loader, 26 x RedLineStealer)
Reporter zbetcheckin
Tags:32 Cutwail exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
316
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
113ac743212e56ac38d22182d7b38385
Verdict:
Malicious activity
Analysis date:
2022-06-09 02:45:08 UTC
Tags:
trojan sinkhole

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% subdirectories
Сreating synchronization primitives
Creating a file
Enabling the 'hidden' option for recently created files
DNS request
Sending an HTTP POST request
Launching a process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Sending an HTTP POST request to an infection source
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware packed ransomware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Creates a thread in another existing process (thread injection)
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Send many emails (e-Mail Spam)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to resolve many domain names, but no domain seems valid
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 642087 Sample: A5VY5aB4rk Startdate: 09/06/2022 Architecture: WINDOWS Score: 100 71 ymlp15.net 2->71 73 paraski.org 2->73 75 495 other IPs or domains 2->75 103 Snort IDS alert for network traffic 2->103 105 Antivirus detection for URL or domain 2->105 107 Multi AV Scanner detection for submitted file 2->107 113 2 other signatures 2->113 8 A5VY5aB4rk.exe 3 68 2->8         started        13 tibqanobatib.exe 48 2->13         started        15 tibqanobatib.exe 48 2->15         started        signatures3 109 System process connects to network (likely due to code injection or exploit) 73->109 111 Tries to resolve many domain names, but no domain seems valid 73->111 process4 dnsIp5 83 www.fink.com 8->83 85 riwn.org 8->85 91 157 other IPs or domains 8->91 53 C:\Users\user\tibqanobatib.exe, PE32 8->53 dropped 55 C:\Users\...\tibqanobatib.exe:Zone.Identifier, ASCII 8->55 dropped 115 Drops PE files to the user root directory 8->115 117 Writes to foreign memory regions 8->117 119 Allocates memory in foreign processes 8->119 17 svchost.exe 8->17         started        20 svchost.exe 8->20         started        22 svchost.exe 8->22         started        87 www.t-tre.com 13->87 89 www.stajum.com 13->89 93 22 other IPs or domains 13->93 121 Multi AV Scanner detection for dropped file 13->121 123 Machine Learning detection for dropped file 13->123 125 Injects a PE file into a foreign processes 13->125 25 svchost.exe 13->25         started        27 svchost.exe 13->27         started        29 svchost.exe 13->29         started        31 svchost.exe 15->31         started        file6 127 System process connects to network (likely due to code injection or exploit) 85->127 signatures7 process8 dnsIp9 95 System process connects to network (likely due to code injection or exploit) 17->95 97 Injects a PE file into a foreign processes 17->97 33 svchost.exe 12 17->33         started        37 svchost.exe 3 12 17->37         started        43 2 other processes 17->43 39 svchost.exe 12 20->39         started        41 svchost.exe 20->41         started        45 2 other processes 20->45 77 67.195.12.38 YAHOO-GQ1US United States 22->77 79 185.70.42.128 PROTONCH Switzerland 22->79 81 6 other IPs or domains 22->81 99 Creates a thread in another existing process (thread injection) 22->99 47 2 other processes 22->47 49 2 other processes 25->49 51 3 other processes 27->51 signatures10 process11 dnsIp12 57 unicus.jp 33->57 59 105 other IPs or domains 33->59 101 System process connects to network (likely due to code injection or exploit) 33->101 61 103 other IPs or domains 37->61 63 64 other IPs or domains 39->63 65 70 other IPs or domains 41->65 67 91 other IPs or domains 43->67 69 23 other IPs or domains 45->69 signatures13
Threat name:
Win32.Trojan.RedLineStealer
Status:
Malicious
First seen:
2022-06-07 07:19:17 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
22 of 26 (84.62%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
persistence suricata upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
UPX packed file
suricata: ET MALWARE Backdoor.Win32.Pushdo.s Checkin
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
Unpacked files
SH256 hash:
2667c1ba9a3c1f4b69b0adc75c2ce242373823927b3e5c94d5cb670274c28c93
MD5 hash:
8dbe23493c7ca72a67185942a642a211
SHA1 hash:
aab74fa20f0c9b641755cfc45d3c3df62928b78c
SH256 hash:
dfde4df8173b90daa38575d60c96bfc157e045a04e16e46bf073a64fdfd1285e
MD5 hash:
113ac743212e56ac38d22182d7b38385
SHA1 hash:
f1098d33d3fe81e370ea1d75096f51d3bebcd855
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:win_pushdo_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.pushdo.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Cutwail

Executable exe dfde4df8173b90daa38575d60c96bfc157e045a04e16e46bf073a64fdfd1285e

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-06-09 02:41:50 UTC

url : hxxp://37.120.222.121/store/items/73.exe