MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e12b58b042e361d227d4cc3e60e5b5c8ef49c7f70c306d1159c71a7eb335f5cd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: e12b58b042e361d227d4cc3e60e5b5c8ef49c7f70c306d1159c71a7eb335f5cd
SHA3-384 hash: 20d2a580b785189df4214ee1ac127b06e45955696d0759954bd01028f022419a3d330180fb23e786114849e5d6d98d7c
SHA1 hash: dc6115bdc6d63f476203e54e40cb35df72d4014d
MD5 hash: 7d8f0a53352c9188acef922dbecfa588
humanhash: december-wolfram-summer-fillet
File name:e12b58b042e361d227d4cc3e60e5b5c8ef49c7f70c306d1159c71a7eb335f5cd
Download: download sample
File size:591'536 bytes
First seen:2020-09-24 05:43:04 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5e73b19ed62be5256f3249cf57eebc14
ssdeep 12288:TCLIa6MfgkSnojUbPYLAwiw7gku+uFvTBMrKr:uLI8LLAwxgr7r
Threatray 38 similar samples on MalwareBazaar
TLSH D9C4072078E0D071D9A210F916ACBD3103FD9CA0CB2469D396DCF6EA9634DE17B3665B
Reporter JAMESWT_WT
Tags:NEEDCODE SP Z O O signed

Code Signing Certificate

Organisation:DigiCert High Assurance EV Root CA
Issuer:DigiCert High Assurance EV Root CA
Algorithm:sha1WithRSAEncryption
Valid from:Nov 10 00:00:00 2006 GMT
Valid to:Nov 10 00:00:00 2031 GMT
Serial number: 02AC5C266A0B409B8F0B79F2AE462577
Intelligence: 204 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 7431E5F4C3C1CE4690774F0B61E05440883BA9A01ED00BA6ABD7806ED3B118CF
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
94
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Launching a process
Creating a process with a hidden window
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
52 / 100
Signature
Contains functionality to inject code into remote processes
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 289441 Sample: xBUSzKSelr Startdate: 24/09/2020 Architecture: WINDOWS Score: 52 14 Multi AV Scanner detection for submitted file 2->14 7 xBUSzKSelr.exe 3 2->7         started        process3 signatures4 16 Contains functionality to inject code into remote processes 7->16 10 powershell.exe 7->10         started        process5 process6 12 conhost.exe 10->12         started       
Threat name:
Win32.Trojan.Emotet
Status:
Malicious
First seen:
2020-09-24 05:41:48 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates connected drives
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments