MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ea8f64464c29c09b37c9f05be40718e144a375aeb920ed699fb3dea644d508aa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: ea8f64464c29c09b37c9f05be40718e144a375aeb920ed699fb3dea644d508aa
SHA3-384 hash: 501ac26fec47825f54649f62c38d4262abe17303b8942b58fe0ddebffb4fea90cb4471128e197da0ef62f5504ee132fa
SHA1 hash: a423c457ef379e79586fb41792a2e1c9a4561c54
MD5 hash: 1f6e97094da422c94011d97bb1320c8c
humanhash: lima-freddie-carolina-island
File name:BitCoin Updated Security Terms and Policy.exe
Download: download sample
File size:259'072 bytes
First seen:2020-12-26 08:12:31 UTC
Last seen:2020-12-26 09:37:50 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 3072:dtbLIHcjqbN/l71vJpVZ0y13knCgmg2fXaxM0+urh5dQMwe:HbIcjwxvHVZ0y1UCgV2p0+uhQM
Threatray 25 similar samples on MalwareBazaar
TLSH E4446186EB804584DC2D6B74243E8D25561FBEFAE8B4A54D2F8DB2357BF31E3143244A
Reporter abuse_ch
Tags:exe


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: email.blockchain.com
Sending IP: 185.244.38.210
From: Blockchain.com<newsletter@email.blockchain.com>
Subject: URGENT SECURITY ACTION!
Attachment: BitCoin Updated Security Terms and Policy pdf.zip (contains "BitCoin Updated Security Terms and Policy.exe")

Intelligence


File Origin
# of uploads :
2
# of downloads :
356
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
BitCoin Updated Security Terms and Policy.exe
Verdict:
Suspicious activity
Analysis date:
2020-12-26 08:13:00 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a file
Creating a window
Sending a UDP request
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
72 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Razy
Status:
Malicious
First seen:
2020-12-26 00:18:52 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Drops startup file
Unpacked files
SH256 hash:
ea8f64464c29c09b37c9f05be40718e144a375aeb920ed699fb3dea644d508aa
MD5 hash:
1f6e97094da422c94011d97bb1320c8c
SHA1 hash:
a423c457ef379e79586fb41792a2e1c9a4561c54
SH256 hash:
15628fcec13a3910b81604550dc7163531b79eb0ceb5ce53792a55ad36c4d018
MD5 hash:
d2cd0401f88e18f52c8cd543cb628552
SHA1 hash:
59c0fdecf9b61726a477301e34b3c725bad7d9d6
SH256 hash:
5026b4d5a20d9bd7f07f111adbfdcdffa3423e83a1f5a982c1c34ad610eaa678
MD5 hash:
51aed80bd9770c6cd1f8782f1e37eeaa
SHA1 hash:
9130e5240d562529ff74c9664fa906168a11012d
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe ea8f64464c29c09b37c9f05be40718e144a375aeb920ed699fb3dea644d508aa

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments