MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e1c911c9ca01ebd5d0293caf5662277d251276dfaf1dcdb3dc581718ad319330. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



lgoogLoader


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: e1c911c9ca01ebd5d0293caf5662277d251276dfaf1dcdb3dc581718ad319330
SHA3-384 hash: 5d673e719004dd0d8b7367efb464c4b4800643f4c738b07245f3bfe7cb2931e644f65a3b39f34f16adce411e78ff5245
SHA1 hash: 6ef72c792948700574ba89283e2340e7ff01cfbc
MD5 hash: ed6dbdf2398812d018cfe6e0def16206
humanhash: angel-alpha-gee-purple
File name:file
Download: download sample
Signature lgoogLoader
File size:2'034'880 bytes
First seen:2022-11-08 18:24:45 UTC
Last seen:2023-08-26 22:05:18 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f1feeb9e7dee8c31856c4e424ba4c89b (3 x RedLineStealer, 2 x lgoogLoader, 1 x RemcosRAT)
ssdeep 49152:lPCFPp7MYXdk2Btd8llPgvZvNA92nByW/lb6hPd1IZkKXwfzh:lkTdk2Btd8rkY+yW/lOhb7zh
Threatray 18 similar samples on MalwareBazaar
TLSH T1D195F1346F1031CFF01E33F99AA76EA15666825909B482D70ACF5B0D3F969F5EC9824C
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 29968eccc8cccc15 (1 x lgoogLoader)
Reporter andretavare5
Tags:exe LgoogLoader signed

Code Signing Certificate

Organisation:*.infinity.com
Issuer:Sectigo RSA Organization Validation Secure Server CA
Algorithm:sha256WithRSAEncryption
Valid from:2022-08-22T00:00:00Z
Valid to:2023-09-21T23:59:59Z
Serial number: 982bb3995415c1ce157998f0b036fccd
Intelligence: 7 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 25a5278acd84018fb292d01807a8d461d3795437f7ff362e982bb2a55af9a6ce
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
andretavare5
Sample downloaded from http://85.31.44.208/files/Mp3studio.exe

Intelligence


File Origin
# of uploads :
52
# of downloads :
186
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Suspicious activity
Analysis date:
2022-11-08 18:25:53 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Launching a process
Sending a custom TCP request
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionQueryPerformanceCounter
CheckCmdLine
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
lgoogLoader
Detection:
malicious
Classification:
troj.evad
Score:
68 / 100
Signature
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected lgoogLoader
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2022-11-08 18:25:14 UTC
File Type:
PE (Exe)
Extracted files:
27
AV detection:
16 of 26 (61.54%)
Threat level:
  5/5
Result
Malware family:
lgoogloader
Score:
  10/10
Tags:
family:lgoogloader downloader
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Detects LgoogLoader payload
LgoogLoader
Unpacked files
SH256 hash:
d0be19607fb65be32263afbdb623708596e0defa3f11f0c9332ddaadbc9a0ffc
MD5 hash:
4cbc03afa177e889ad16022291288838
SHA1 hash:
5b2da7315e41de94cfa0687e43b3746ae5dd510d
SH256 hash:
cdd35f3024801e3f20a5809efa3d866356bb5f8eaee20a4c64788223f9d51243
MD5 hash:
a82bf0ab99bd07797f931d6897332cf0
SHA1 hash:
8772027f160c6712ca0d3b82f07efa270aa26f2d
SH256 hash:
e1c911c9ca01ebd5d0293caf5662277d251276dfaf1dcdb3dc581718ad319330
MD5 hash:
ed6dbdf2398812d018cfe6e0def16206
SHA1 hash:
6ef72c792948700574ba89283e2340e7ff01cfbc
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments