MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e245603d93bc6a65e4ffe1a4ce8f9c0a9d500fa2fc0ceea85de8216a0b4b140d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: e245603d93bc6a65e4ffe1a4ce8f9c0a9d500fa2fc0ceea85de8216a0b4b140d
SHA3-384 hash: 4899df30ac67b3783f645b8c66c13073844169dc1abf21417a9fdcfc3bde7299d45845d8baead607fd0e7d84131cec00
SHA1 hash: ec05c8dd0ffb1aae26557a47a0ab552f966fcadf
MD5 hash: 831bbabfcd2487c10c13fbdd6ab35641
humanhash: ten-michigan-summer-oregon
File name:BBIOHV.eXE
Download: download sample
File size:1'237'089 bytes
First seen:2021-12-14 16:41:45 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ae9f6a32bb8b03dce37903edbc855ba1 (28 x CryptOne, 18 x RedLineStealer, 15 x njrat)
ssdeep 24576:hZ7Xar2VsBq/OebtXkkyvxjXx7uGebB92G44f/czKenXI1xyKnC:NsGzSjX1uN9T4nZY1xyKC
Threatray 1'215 similar samples on MalwareBazaar
TLSH T121451232FAC584B1D5732C3559F8C731AA3C7C202F648F5EA7E43A1EAE705814625BA3
File icon (PE):PE icon
dhash icon 9494b494d4aeaeac (832 x DCRat, 172 x RedLineStealer, 134 x CryptOne)
Reporter iam_py_test
Tags:exe spyware

Intelligence


File Origin
# of uploads :
1
# of downloads :
238
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
setup_x86_x64_install.exe
Verdict:
Malicious activity
Analysis date:
2021-10-30 11:12:56 UTC
Tags:
trojan rat redline evasion loader opendir stealer vidar formbook

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Launching a process
Launching cmd.exe command interpreter
Creating a process with a hidden window
DNS request
Creating a file in the %temp% directory
Delayed writing of the file
Creating a process from a recently created file
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Launching a tool to kill processes
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
76 / 100
Signature
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Suspicious MSHTA Process Patterns
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 539716 Sample: BBIOHV.eXE Startdate: 14/12/2021 Architecture: WINDOWS Score: 76 24 Multi AV Scanner detection for submitted file 2->24 26 Machine Learning detection for sample 2->26 28 Sigma detected: Mshta Spawning Windows Shell 2->28 30 2 other signatures 2->30 8 BBIOHV.eXE 8 2->8         started        process3 process4 10 mshta.exe 19 8->10         started        process5 12 cmd.exe 2 10->12         started        file6 22 C:\Users\user\AppData\Local\Temp\BBIOHV.eXE, PE32 12->22 dropped 15 BBIOHV.eXE 7 12->15         started        18 taskkill.exe 1 12->18         started        20 conhost.exe 12->20         started        process7 signatures8 32 Multi AV Scanner detection for dropped file 15->32 34 Machine Learning detection for dropped file 15->34
Threat name:
Win32.Trojan.Cryprar
Status:
Malicious
First seen:
2021-10-30 05:36:42 UTC
File Type:
PE (Exe)
Extracted files:
17
AV detection:
23 of 45 (51.11%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Kills process with taskkill
Modifies Internet Explorer settings
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Unpacked files
SH256 hash:
e245603d93bc6a65e4ffe1a4ce8f9c0a9d500fa2fc0ceea85de8216a0b4b140d
MD5 hash:
831bbabfcd2487c10c13fbdd6ab35641
SHA1 hash:
ec05c8dd0ffb1aae26557a47a0ab552f966fcadf
Malware family:
CryptOne
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments