MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ed09f47bd911f8217f21abd8aab29a19703e997e5543d8a6b80662eeded0205a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Guildma


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: ed09f47bd911f8217f21abd8aab29a19703e997e5543d8a6b80662eeded0205a
SHA3-384 hash: 0d711e3f7bf3ba566d1615910e3d584552120d30a1b6c43f614ecb17957e6d1379e67a41359995d207fc634b8f1296c9
SHA1 hash: 8151cdefd3e51671051182c913c79fcc929b6c51
MD5 hash: 62ce86c117ad558c116804eee904b932
humanhash: lion-queen-september-fish
File name:62ce86c117ad558c116804eee904b932.msi
Download: download sample
Signature Guildma
File size:278'528 bytes
First seen:2021-12-15 10:14:43 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 3072:hvspAtOImXwCGjtYNKbYO2gjpcm8rRuqpjCLw2loHUvU4yGxr53qM2a83TVCZA:hptOIiRQYpgjpjew5LLyGx1qo8DVE
Threatray 17 similar samples on MalwareBazaar
TLSH T169447B513BC9C13AD2AE063785BA9766263A7D711B20D0CF7B947D6C5E307D2EA39302
Reporter abuse_ch
Tags:BRA geo guildma msi

Intelligence


File Origin
# of uploads :
1
# of downloads :
226
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
fingerprint packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Obfuscated command line found
Sigma detected: Suspicious MSHTA Process Patterns
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 540231 Sample: hRkEruZJxz.msi Startdate: 15/12/2021 Architecture: WINDOWS Score: 48 58 Sigma detected: Suspicious MSHTA Process Patterns 2->58 9 msiexec.exe 3 16 2->9         started        12 msiexec.exe 5 2->12         started        process3 file4 48 C:\Windows\Installer\MSIBD88.tmp, PE32 9->48 dropped 50 C:\Windows\Installer\MSI63DD.tmp, PE32 9->50 dropped 14 msiexec.exe 5 9->14         started        process5 signatures6 60 Obfuscated command line found 14->60 17 cmd.exe 1 14->17         started        20 expand.exe 8 14->20         started        23 netbtugc.exe 1 14->23         started        25 2 other processes 14->25 process7 file8 56 Obfuscated command line found 17->56 27 cmd.exe 1 17->27         started        29 conhost.exe 17->29         started        31 cmd.exe 2 17->31         started        44 C:\Users\user~1\...\netbtugc.exe (copy), PE32+ 20->44 dropped 46 C:\...\204884458dcd414ba1e5b4e7602206c8.tmp, PE32+ 20->46 dropped 33 conhost.exe 20->33         started        35 conhost.exe 23->35         started        37 conhost.exe 25->37         started        39 conhost.exe 25->39         started        signatures9 process10 process11 41 mshta.exe 18 27->41         started        dnsIp12 52 0goob8.twesdaywebbros.sbs 172.67.134.231, 49759, 80 CLOUDFLARENETUS United States 41->52 54 www.cloudflare.com 104.16.123.96, 443, 49760 CLOUDFLARENETUS United States 41->54
Threat name:
Document-OLE.Trojan.Alien
Status:
Malicious
First seen:
2021-12-15 10:15:12 UTC
File Type:
Binary (Archive)
Extracted files:
28
AV detection:
6 of 43 (13.95%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery
Behaviour
Checks SCSI registry key(s)
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Enumerates connected drives
Loads dropped DLL
Modifies file permissions
Blocklisted process makes network request
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments