MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e248b01e3ccde76b4d8e8077d4fcb4d0b70e5200bf4e738b45a0bd28fbc2cae6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 6 File information Comments

SHA256 hash: e248b01e3ccde76b4d8e8077d4fcb4d0b70e5200bf4e738b45a0bd28fbc2cae6
SHA3-384 hash: ab51076ccf0eb900b1e69b133b85882e1009ba1adda89fba2777ea133df2e36854361b4ab535e92122f64c317edc01f0
SHA1 hash: 33c02d70abb2f1f12a79cfd780d875a94e7fe877
MD5 hash: 1e2a99ae43d6365148d412b5dfee0e1c
humanhash: lima-leopard-twelve-ink
File name:PDFpower.exe
Download: download sample
File size:1'086'184 bytes
First seen:2023-05-10 11:23:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'874 x AgentTesla, 19'799 x Formbook, 12'305 x SnakeKeylogger)
ssdeep 24576:sWjYtbXSRxqO8m657w6ZBLmkitKqBCjC0PDgM5A6:sW8tbiJVV1BCjB
Threatray 1'539 similar samples on MalwareBazaar
TLSH T19C355A0E2FEB4AD6D1AE1735A830DA3756F1BC076D6ED78E9444B0A81C737608E90367
TrID 60.4% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.8% (.SCR) Windows screen saver (13097/50/3)
8.7% (.EXE) Win64 Executable (generic) (10523/12/4)
5.4% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon 03e4d8c9398da4c1
Reporter Progenit0r
Tags:downloader.msil/pdfpower exe signed

Code Signing Certificate

Organisation:MY TECH MEDIA LTD
Issuer:GlobalSign Extended Validation CodeSigning CA - SHA256 - G3
Algorithm:sha256WithRSAEncryption
Valid from:2021-03-04T09:42:38Z
Valid to:2024-03-04T09:42:38Z
Serial number: 182c66d4ce18c4ec682e71dd
Thumbprint Algorithm:SHA256
Thumbprint: 2936d7fce10515b2aa0a130616d58982b2b4cb85c39a60b10913b4c48449dc5f
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
260
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e248b01e3ccde76b4d8e8077d4fcb4d0b70e5200bf4e738b45a0bd28fbc2cae6
Verdict:
Malicious activity
Analysis date:
2023-03-08 14:27:47 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm cmd.exe fingerprint keylogger overlay packed packed virus
Verdict:
Malicious
Labled as:
MSIL/MediaArena.A potentially unwanted application
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.evad
Score:
45 / 100
Signature
.NET source code contains potential unpacker
Contains functionality to log keystrokes (.Net Source)
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Behaviour
Behavior Graph:
Threat name:
Win32.Browser.MediaArena
Status:
Malicious
First seen:
2022-11-24 16:12:44 UTC
File Type:
PE (.Net Exe)
Extracted files:
25
AV detection:
20 of 37 (54.05%)
Threat level:
  4/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
bootkit persistence
Behaviour
Modifies system certificate store
Suspicious use of AdjustPrivilegeToken
Writes to the Master Boot Record (MBR)
Unpacked files
SH256 hash:
57ed3a8b06c3ee40450d175eae8058edd164c20e95644614cc497cefdea01a00
MD5 hash:
8a5e8bb8e0caad41d88c75223009f110
SHA1 hash:
cddad5b3b761f8a6762b9ba6e5a5526d49c91339
SH256 hash:
cd2b9cf8489cca6b357bc2706a68f5a12aeb696380ce7371803d68f08e337630
MD5 hash:
1b8f681b07a5e4b07889bd7265cb859e
SHA1 hash:
239e83e64f2ed10b976ff67556ceea1d1aea2712
SH256 hash:
e248b01e3ccde76b4d8e8077d4fcb4d0b70e5200bf4e738b45a0bd28fbc2cae6
MD5 hash:
1e2a99ae43d6365148d412b5dfee0e1c
SHA1 hash:
33c02d70abb2f1f12a79cfd780d875a94e7fe877
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_OneNote
Author:spatronn
Description:Hard-Detect One

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via drive-by

Comments