MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ece51219ee60a3d804fc6707d974e62689b4563fdb0a65330d3ca85abb294d16. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 4 File information Comments

SHA256 hash: ece51219ee60a3d804fc6707d974e62689b4563fdb0a65330d3ca85abb294d16
SHA3-384 hash: 40c575aed68f208c88e2e5746a545a1fc7a52768e855537bb1efcdb75940fa0f2828f73781a2e2dcca22bd7e4adb2918
SHA1 hash: 3ab573b8e64fa2c0cfe7c14e3f18b71dce0f360c
MD5 hash: 17fbfeb582fbf72f86679a88d8f40dd4
humanhash: winter-william-stairway-artist
File name:17fbfeb582fbf72f86679a88d8f40dd4.exe
Download: download sample
File size:7'395'820 bytes
First seen:2023-10-11 19:31:02 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c9a3edae9204609d90d0770c3583acd8
ssdeep 98304:2jTTsHU+DTwl9zOHz7t1Q5RRlWY9HJ3CChZfYQmGKd1q1pjl:ITqU4TIqY5BZdwnGO1q19l
Threatray 128 similar samples on MalwareBazaar
TLSH T12876331CCB637B79D988413DA48F1B17EB90CF880DF4C15B0BE139DD267299BA927462
TrID 53.3% (.EXE) UPX compressed Win32 Executable (27066/9/6)
25.8% (.SCR) Windows screen saver (13097/50/3)
8.8% (.EXE) Win32 Executable (generic) (4505/5/1)
4.0% (.EXE) OS/2 Executable (generic) (2029/13)
3.9% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon 0000000000000000 (898 x AgentTesla, 540 x Formbook, 316 x RedLineStealer)
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
276
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
17fbfeb582fbf72f86679a88d8f40dd4.exe
Verdict:
Malicious activity
Analysis date:
2023-10-11 19:56:03 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Adding an access-denied ACE
Using the Windows Management Instrumentation requests
Creating a file
Creating a file in the %temp% directory
DNS request
Sending an HTTP GET request
Sending a custom TCP request
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
asprotect lolbin ntkrnl_protector overlay packed packed packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
72 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Checks if the current machine is a virtual machine (disk enumeration)
PE file has nameless sections
Queries sensitive service information (via WMI, MSSMBios_RawSMBiosTables, often done to detect sandboxes)
Query firmware table information (likely to detect VMs)
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2023-10-11 06:58:20 UTC
File Type:
PE (Exe)
Extracted files:
25
AV detection:
22 of 38 (57.89%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Checks SCSI registry key(s)
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Unpacked files
SH256 hash:
e6a3deeebe9de112a9a0c0c456a15e7f6cbae0af5d859932bdc5ff1ad9cfa60e
MD5 hash:
f9ed18b2c390e5ba72856b91ca018b7e
SHA1 hash:
eaa08d0e0faad4b3187af16b44d99de343e204c5
SH256 hash:
1805550f477a19ff37c29d3be48ee991b92618ecf3208346f4efaacd2b5d84ea
MD5 hash:
b0bae192c92fce3aa80624602c40fd3d
SHA1 hash:
78767b676f1180ad6368e8c48e342c83825b49f2
SH256 hash:
ece51219ee60a3d804fc6707d974e62689b4563fdb0a65330d3ca85abb294d16
MD5 hash:
17fbfeb582fbf72f86679a88d8f40dd4
SHA1 hash:
3ab573b8e64fa2c0cfe7c14e3f18b71dce0f360c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:adonunix2
Author:Tim Brown @timb_machine
Description:AD on UNIX
Rule name:ASProtect13321RegisteredAlexeySolodovnikov
Author:malware-lu
Rule name:ASProtectv12xNewStrain
Author:malware-lu
Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe ece51219ee60a3d804fc6707d974e62689b4563fdb0a65330d3ca85abb294d16

(this sample)

  
Delivery method
Distributed via web download

Comments