MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e1c1ddf6eb34c6be593f5a46848af10dedaaf5917f55023b26d918e61709e8bb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 4 File information Comments 1

SHA256 hash: e1c1ddf6eb34c6be593f5a46848af10dedaaf5917f55023b26d918e61709e8bb
SHA3-384 hash: 014fdbb9829f87e7bbd194bbe772ad5a47137867d5f66c31de00a1a1ad7b7a3f6dd55a38181f5061a937517db3539c54
SHA1 hash: a92fc97678640aac45ba9b09b7dd542f7b1b7af6
MD5 hash: 3a941e2b23eda1cae45fde198191086d
humanhash: paris-mexico-december-four
File name:3a941e2b23eda1cae45fde198191086d
Download: download sample
File size:260'096 bytes
First seen:2022-09-10 06:50:41 UTC
Last seen:2022-09-10 15:19:28 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash a490e3ca20f57194cb1f4b473b3242c4 (17 x RedLineStealer, 1 x ArkeiStealer)
ssdeep 3072:ArYBjzEbd8wBiN+g3qfG81dS3S5+S2WeALvFdRZp0N41YlqXHK6xUAB5ZCTn9J:5BjzEb6wS+g3MGadCSzCynZ31x5cTr
TLSH T186441B6C94996B52D7A209750DAA818048F2FD52BE38CC35E6A078B5017FC3D6778CFB
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4505/5/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter zbetcheckin
Tags:32 exe

Intelligence


File Origin
# of uploads :
6
# of downloads :
361
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
3a941e2b23eda1cae45fde198191086d
Verdict:
Suspicious activity
Analysis date:
2022-09-10 06:51:47 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Unauthorized injection to a recently created process
Creating a file
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Running batch commands
DNS request
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Launching a process
Creating a file in the Windows subdirectories
Using the Windows Management Instrumentation requests
Reading critical registry keys
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Sending a TCP request to an infection source
Unauthorized injection to a recently created process by context flags manipulation
Stealing user critical data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
84 / 100
Signature
Antivirus detection for dropped file
Contains functionality to inject code into remote processes
Creates HTML files with .exe extension (expired dropper behavior)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Very long command line found
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Tiggre
Status:
Malicious
First seen:
2022-09-10 06:51:06 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Executes dropped EXE
Unpacked files
SH256 hash:
976213ff7dd1ec06530460c3a0618e239a2dce40350a99da25aa3b119871e850
MD5 hash:
9d0dad829c7779bbd7a6e742d6b705ed
SHA1 hash:
d1aaf3cfd344e8e332540f2d279679885590d01d
SH256 hash:
e1c1ddf6eb34c6be593f5a46848af10dedaaf5917f55023b26d918e61709e8bb
MD5 hash:
3a941e2b23eda1cae45fde198191086d
SHA1 hash:
a92fc97678640aac45ba9b09b7dd542f7b1b7af6
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:RansomwareTest3
Author:Daoyuan Wu
Description:Test Ransomware YARA rules

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe e1c1ddf6eb34c6be593f5a46848af10dedaaf5917f55023b26d918e61709e8bb

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-09-10 06:50:47 UTC

url : hxxps://www.btishop.ma/12/TrdngAnr6339.exe