MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e41b8e4c98220e98333fb45247d384cb27c06fbd21aed71ed86defd8449dae59. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 7
| SHA256 hash: | e41b8e4c98220e98333fb45247d384cb27c06fbd21aed71ed86defd8449dae59 |
|---|---|
| SHA3-384 hash: | 888a29c286cb00de3ec26a19bbfbb6218b436a523eca6e97c8cb3088e571ca748cc80fc17bb785bc82b659c531ad716e |
| SHA1 hash: | 3eedb898f741b9665ffb85d104501fdb1f0f1fd5 |
| MD5 hash: | 113c47cc37ba850f804de17985add1b6 |
| humanhash: | bakerloo-delaware-kitten-paris |
| File name: | DHL DELIVERY NOTE 2021003982721.exe |
| Download: | download sample |
| File size: | 892'743 bytes |
| First seen: | 2021-03-30 12:16:15 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 7fa974366048f9c551ef45714595665e (946 x Formbook, 398 x Loki, 261 x AgentTesla) |
| ssdeep | 24576:9vIS8YEkqPvWL6YlCRiUjCrwYNmpFbg6c:9vIS8YEkCvWGbCrtsbUz |
| Threatray | 908 similar samples on MalwareBazaar |
| TLSH | 2815E086E5807969DE397B706E7ACE3107135EBE743C245C29DA3E673F7A493100A863 |
| Reporter | |
| Tags: | DHL exe |
abuse_ch
Malspam distributing unidentified malware:HELO: vxsys-smtpclusterma-03.srv.cat
Sending IP: 46.16.60.200
From: Carlos Sánchez <nitinsachideva@yahoo.com>
Subject: DHL DELIVERY NOTIFICATION
Attachment: DHL DELIVERY NOTE 2021003982721.LZ (contains "DHL DELIVERY NOTE 2021003982721.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
100
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% subdirectories
Creating a file in the %AppData% subdirectories
Sending a UDP request
Modifying an executable file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Forced shutdown of a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
StormKitty
Detection:
malicious
Classification:
rans.spyw.evad.phis.troj
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Creates autostart registry keys with suspicious names
Detected suspicious e-Mail address in disassembly
Found many strings related to Crypto-Wallets (likely being stolen)
Installs a global keyboard hook
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sample uses process hollowing technique
Sigma detected: Suspicious Svchost Process
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Yara detected Generic Dropper
Yara detected StormKitty Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.Generic
Status:
Suspicious
First seen:
2021-03-30 12:17:06 UTC
AV detection:
16 of 28 (57.14%)
Threat level:
2/5
Detection(s):
Suspicious file
Verdict:
suspicious
Similar samples:
+ 898 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
7/10
Tags:
persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Unpacked files
SH256 hash:
1f35bb6728237483c779005fc227e69fef51b0bafd32d15855d483948a337078
MD5 hash:
eef9e469e8a30717974499f277d97e2a
SHA1 hash:
2d33c25984ebd9116beeb55cdde4c5c86c023e5d
SH256 hash:
94528c3bb28b6ee8499c5a7c9c88c6d5a6c4ca8b9810a39a6510d32d7decd7fe
MD5 hash:
59dc56bfd5eb4f6554a51626edd6fcfd
SHA1 hash:
0596451dbd010ac63759868355ea74590eaf2e74
SH256 hash:
e41b8e4c98220e98333fb45247d384cb27c06fbd21aed71ed86defd8449dae59
MD5 hash:
113c47cc37ba850f804de17985add1b6
SHA1 hash:
3eedb898f741b9665ffb85d104501fdb1f0f1fd5
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
0.77
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
exe e41b8e4c98220e98333fb45247d384cb27c06fbd21aed71ed86defd8449dae59
(this sample)
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.