MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ed298ed0a286707fb06ae7ad689e2fe26b948604fca7f9e375a22eda2388adbb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: ed298ed0a286707fb06ae7ad689e2fe26b948604fca7f9e375a22eda2388adbb
SHA3-384 hash: 99266bcbf36c4dae9ac21843879f30fa7f7b5326dae0d9d6a236a7cabe5fabed00c5bd452de3ede91ad114e25181c1c9
SHA1 hash: ee8f90321c91171e489d7a8e6a1415f075468eb6
MD5 hash: a9172666da67d245c710fd71407178f1
humanhash: pluto-papa-eighteen-north
File name:random.exe
Download: download sample
File size:2'636'800 bytes
First seen:2025-01-03 22:23:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9ce1e3b170c9365da5a16f5bce0983b0
ssdeep 49152:rYoQhcn8+iezb8XIw13ItW4vsmoNvOgbesU43ZkgFi0/fkhrC+11SqKDZ8gUH9ju:Pz+y4VC68YwiKE
TLSH T1A4C54A2B61A9609AE3E7C07CE5065792FC3176485E39A3B724B68392373091C9B7D373
TrID 38.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
15.6% (.ICL) Windows Icons Library (generic) (2059/9)
15.4% (.EXE) OS/2 Executable (generic) (2029/13)
15.2% (.EXE) Generic Win/DOS Executable (2002/3)
15.2% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter Joker
Tags:exe malware trojan

Intelligence


File Origin
# of uploads :
1
# of downloads :
557
Origin country :
GR GR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
random.exe
Verdict:
Malicious activity
Analysis date:
2025-01-03 22:24:44 UTC
Tags:
stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
virus
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug packed packed packer_detected
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.mine.evad
Score:
76 / 100
Signature
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1583965 Sample: random.exe Startdate: 03/01/2025 Architecture: WINDOWS Score: 76 39 tataragirld.site 2->39 53 Multi AV Scanner detection for submitted file 2->53 55 AI detected suspicious sample 2->55 8 random.exe 2->8         started        12 msedge.exe 61 690 2->12         started        14 msedge.exe 2->14         started        16 msedge.exe 2->16         started        signatures3 process4 dnsIp5 47 tataragirld.site 188.114.96.3, 443, 49737, 49738 CLOUDFLARENETUS European Union 8->47 57 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 8->57 59 Found many strings related to Crypto-Wallets (likely being stolen) 8->59 61 Found strings related to Crypto-Mining 8->61 65 2 other signatures 8->65 18 msedge.exe 16 8->18         started        49 192.168.2.4, 138, 443, 49590 unknown unknown 12->49 51 239.255.255.250 unknown Reserved 12->51 63 Maps a DLL or memory area into another process 12->63 20 msedge.exe 12->20         started        23 msedge.exe 12->23         started        25 msedge.exe 12->25         started        33 2 other processes 12->33 27 msedge.exe 14->27         started        29 msedge.exe 14->29         started        35 2 other processes 14->35 31 msedge.exe 16->31         started        signatures6 process7 dnsIp8 37 msedge.exe 18->37         started        41 104.46.162.224, 443, 49798, 49821 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 20->41 43 20.110.205.119, 443, 49809 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 20->43 45 17 other IPs or domains 20->45 process9
Result
Malware family:
n/a
Score:
  7/10
Tags:
collection discovery spyware stealer
Behaviour
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
outlook_office_path
Browser Information Discovery
Accesses Microsoft Outlook profiles
Reads WinSCP keys stored on the system
Reads user/profile data of web browsers
Verdict:
Malicious
Tags:
Win.Packed.Ulise-10038495-0
YARA:
n/a
Unpacked files
SH256 hash:
ed298ed0a286707fb06ae7ad689e2fe26b948604fca7f9e375a22eda2388adbb
MD5 hash:
a9172666da67d245c710fd71407178f1
SHA1 hash:
ee8f90321c91171e489d7a8e6a1415f075468eb6
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_detect_tls_callbacks
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
Reviews
IDCapabilitiesEvidence
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryA
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegQueryValueExA

Comments