MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e700a5c4c0969393e63617581e5480c35b77cfeee506c6701775b8403d3fc24c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: e700a5c4c0969393e63617581e5480c35b77cfeee506c6701775b8403d3fc24c
SHA3-384 hash: d7e67ab2b19c773c7dff2bce467b45a30479839481e0a820affbca37e742d9184c94858c1d41a953c87214912d1ff650
SHA1 hash: 75a86492d7060e5cd1179b5845f6e903bd57bf48
MD5 hash: e4300dd0ccae1c657120881df797bddc
humanhash: spaghetti-music-hamper-black
File name:e700a5c4c0969393e63617581e5480c35b77cfeee506c6701775b8403d3fc24c
Download: download sample
File size:751'616 bytes
First seen:2021-08-30 01:31:14 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a31761b5a590c4c499d5f4a347d75c12 (23 x Formbook, 17 x AgentTesla, 6 x RedLineStealer)
ssdeep 12288:rn/zjvGHAykHJRLW/4+8bzbBSreM3CqZGDxM/f4r4dmGrZzp:jz7GHAzH7jX1tFxM34r6rJ
Threatray 10 similar samples on MalwareBazaar
TLSH T1D4F4BF17F7DBF6B0E6BE827A86B1851D52B774620370A78F664072896D23382453DB0F
Reporter Anonymous
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
90
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PO#_HM00050746#_CICITEL_MULTI_TRADING_Systems,_Inc_.xll
Verdict:
No threats detected
Analysis date:
2021-08-27 09:39:31 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Creating a file
Sending a UDP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 473617 Sample: CGgFtKztk5 Startdate: 30/08/2021 Architecture: WINDOWS Score: 48 40 Multi AV Scanner detection for submitted file 2->40 7 loaddll64.exe 4 2->7         started        process3 process4 9 iexplore.exe 1 74 7->9         started        11 rundll32.exe 7->11         started        13 cmd.exe 1 7->13         started        15 14 other processes 7->15 process5 17 iexplore.exe 2 147 9->17         started        20 WerFault.exe 11->20         started        22 rundll32.exe 1 13->22         started        24 WerFault.exe 15->24         started        26 WerFault.exe 15->26         started        28 WerFault.exe 15->28         started        30 2 other processes 15->30 dnsIp6 32 dart.l.doubleclick.net 142.250.185.70, 443, 49744, 49745 GOOGLEUS United States 17->32 34 geolocation.onetrust.com 104.20.185.68, 443, 49738, 49739 CLOUDFLARENETUS United States 17->34 38 10 other IPs or domains 17->38 36 192.168.2.1 unknown unknown 20->36
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2021-08-27 10:51:49 UTC
AV detection:
2 of 45 (4.44%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Unpacked files
SH256 hash:
e700a5c4c0969393e63617581e5480c35b77cfeee506c6701775b8403d3fc24c
MD5 hash:
e4300dd0ccae1c657120881df797bddc
SHA1 hash:
75a86492d7060e5cd1179b5845f6e903bd57bf48
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments