MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e2a5f032f531b0dba4379de8da36ad1e5617d4b5630bfeeb1db7ca75cf976dcc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: e2a5f032f531b0dba4379de8da36ad1e5617d4b5630bfeeb1db7ca75cf976dcc
SHA3-384 hash: ac0e2c2d3a8c8904e9f530d1e644c033505d8dfc832b7741b46ea02ad0d76356003ab5566e4a58b896ce2d859b943e27
SHA1 hash: 372f76c2c637d3ff96a9851a5a63adb8b5a3033f
MD5 hash: 4a3b3aa0b72d467be7321ceac9d3db92
humanhash: colorado-river-high-vermont
File name:iqbtcvforWiTEi.bin
Download: download sample
File size:656'896 bytes
First seen:2020-07-20 10:57:55 UTC
Last seen:2020-08-02 07:34:49 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:oeIdz1AOQ71q9I6/kldSCGDyaod+ik4g8y3SoDOD/hqCjhZCdBUk:oL1AP7OPW2rEloDahqO
Threatray 41 similar samples on MalwareBazaar
TLSH 02D4D0C83A40940EC59E1EBA5E52CD708370AD46F6F3E34727C66EDE297E39BC905291
Reporter JAMESWT_WT

Intelligence


File Origin
# of uploads :
3
# of downloads :
72
Origin country :
n/a
Vendor Threat Intelligence
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
80 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 248085 Sample: iqbtcvforWiTEi.bin Startdate: 21/07/2020 Architecture: WINDOWS Score: 80 31 Antivirus / Scanner detection for submitted sample 2->31 33 Multi AV Scanner detection for submitted file 2->33 35 Machine Learning detection for sample 2->35 6 iqbtcvforWiTEi.exe 2->6         started        9 iqbtcvforWiTEi.exe 1 2->9         started        12 iqbtcvforWiTEi.exe 2->12         started        process3 file4 37 Antivirus detection for dropped file 6->37 39 Multi AV Scanner detection for dropped file 6->39 41 Machine Learning detection for dropped file 6->41 14 iqbtcvforWiTEi.exe 2 6->14         started        16 iqbtcvforWiTEi.exe 6->16         started        29 C:\Users\user\...\iqbtcvforWiTEi.exe.log, ASCII 9->29 dropped 18 iqbtcvforWiTEi.exe 1 4 9->18         started        21 iqbtcvforWiTEi.exe 9->21         started        23 iqbtcvforWiTEi.exe 2 12->23         started        signatures5 process6 file7 25 C:\Users\user\AppData\...\iqbtcvforWiTEi.exe, PE32 18->25 dropped 27 C:\...\iqbtcvforWiTEi.exe:Zone.Identifier, ASCII 18->27 dropped
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-07-20 10:59:07 UTC
File Type:
PE (.Net Exe)
Extracted files:
3
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious behavior: AddClipboardFormatListener
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe e2a5f032f531b0dba4379de8da36ad1e5617d4b5630bfeeb1db7ca75cf976dcc

(this sample)

  
Delivery method
Distributed via web download

Comments