MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e920835548ad7b62943d9e1f9fac3cb32112b9cf8c02acbeb8d60c17e08c0818. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Troldesh


Vendor detections: 3


Intelligence 3 IOCs YARA 3 File information Comments

SHA256 hash: e920835548ad7b62943d9e1f9fac3cb32112b9cf8c02acbeb8d60c17e08c0818
SHA3-384 hash: e17826c9db8e63c5b170600384d45c39fab055fe903e9dad65792f8c659921fa94e81f0cc5f0e6665c893455a73dae31
SHA1 hash: bae68284fb59446956736237928fda74d4e3b209
MD5 hash: 30394ae40943a49d1b0771acb813498f
humanhash: twenty-mountain-tango-arkansas
File name:e920835548ad7b62943d9e1f9fac3cb32112b9cf8c02acbeb8d60c17e08c0818
Download: download sample
Signature Troldesh
File size:1'372'936 bytes
First seen:2020-03-23 16:23:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 868468c7d087ca5d78519539d7533ad9 (1 x Troldesh)
ssdeep 24576:KSyLtIBYWFkfV0hfPnZBdWGktI7ie8ydTF4EWC4:mKBlNfPjd1ktOie8y1Fz4
Threatray 16 similar samples on MalwareBazaar
TLSH CA5523E61B392A21FBD61B364180E5D725F4ADBD9554D04EF8BCBC3949B03AB993300E
Reporter Marco_Ramilli
Tags:exe Troldesh

Code Signing Certificate

Organisation:LYQQIJPU
Issuer:LYQQIJPU
Algorithm:sha1WithRSA
Valid from:Nov 11 12:46:28 2018 GMT
Valid to:Dec 31 23:59:59 2039 GMT
Serial number: -55F49381890D1162B8F5A9E3F96A197B
Thumbprint Algorithm:SHA256
Thumbprint: CCD968EA9421030A546816CA428AD24800016E3B40F87AA76D8AE31B5ADD5087
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
1'724
Origin country :
n/a
Vendor Threat Intelligence

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:win_troldesh_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_troldesh_g0
Author:Daniel Plohmann <daniel.plohmann<at>fkie.fraunhofer.de>
Description:Unpacked Shade binary, non-statically-linked part and specific strings (vs. CMSBrute)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Troldesh

Executable exe e920835548ad7b62943d9e1f9fac3cb32112b9cf8c02acbeb8d60c17e08c0818

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryA
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegOpenKeyExW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::GetOpenClipboardWindow

Comments