MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e299314612e2c5d409cb469f7cc4c2221f8f2f9bbbaf9d961c0e63b9b6933324. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 2


Intelligence 2 IOCs YARA File information Comments

SHA256 hash: e299314612e2c5d409cb469f7cc4c2221f8f2f9bbbaf9d961c0e63b9b6933324
SHA3-384 hash: c2477c8db506d4b1a7ecf2464f0b13efb68812aa5afc6d8a3a6cf1727a1bf5de6158893b097ff20a11b81b0afdd58303
SHA1 hash: b39651715ac9a9cb0aa85613ac411b186660e9ec
MD5 hash: 7b285184aaa5760b99e5e089e062610e
humanhash: victor-fifteen-eight-wyoming
File name:e299314612e2c5d409cb469f7cc4c2221f8f2f9bbbaf9d961c0e63b9b6933324
Download: download sample
File size:1'048'576 bytes
First seen:2020-11-07 18:30:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 027ea80e8125c6dda271246922d4c3b0 (10 x njrat, 7 x DCRat, 5 x DarkComet)
ssdeep 12288:jIaw1rK1yvtDCR3p0oR43ZOrMDPfvjz1G1OcyEW1LOiuHFq9B2QV+O5/L2h8yJeU:MaEW8vtDsZ3436MwocyPx9B2QlxIvA
Threatray 258 similar samples on MalwareBazaar
TLSH E6251203FBD285F2E56249394A5EAF45E53DB1300F68D9AFFBC90D6CD9344A06231E62
Reporter seifreed

Intelligence


File Origin
# of uploads :
1
# of downloads :
56
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Searching for the window
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments