MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Venus


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments

SHA256 hash: ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b
SHA3-384 hash: bd8d88c9491d67c6cc8fec892b368f8356b3fefec8ab98d0d5303bcbe9112ed5a0e775024938152bfd7c3b5c2cb58c46
SHA1 hash: e044edce8646124ddc39906e6fb6f02eaff16161
MD5 hash: 0e8476b3c4099a42baca7f16ca8253e6
humanhash: utah-london-seventeen-oxygen
File name:ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.bin
Download: download sample
Signature Venus
File size:230'400 bytes
First seen:2022-10-16 20:18:52 UTC
Last seen:2022-10-16 20:56:52 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash bb2600e94092da119ee6acbbd047be43 (13 x Venus)
ssdeep 6144:hRAvJmXbQwAPnZXJAc4V50DErB5xgTw7ozFz254W:hRAxebQwAPAkDWGcoxfW
Threatray 7 similar samples on MalwareBazaar
TLSH T1A834BE10E6C290F2EC9B4FB995FA59FE50312E308735E3F7DB968EA585326C2D134261
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter Arkbird_SOLG
Tags:exe Ransomware Venus

Intelligence


File Origin
# of uploads :
2
# of downloads :
688
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching cmd.exe command interpreter
Launching a process
Creating a file
Enabling the 'hidden' option for recently created files
Creating a window
Searching for the window
Searching for synchronization primitives
Using the Windows Management Instrumentation requests
Sending a UDP request
Moving a file to the Program Files subdirectory
Changing a file
Moving a file to the %AppData% subdirectory
Modifying an executable file
Moving a file to the Program Files directory
Moving a recently created file
Replacing files
Creating a file in the Windows directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a process with a hidden window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Launching a tool to kill processes
Creating a file in the mass storage device
Encrypting user's files
Infecting executable files
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
greyware shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Venus Ransomware
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Contains functionality to register hotkeys which are used to close and control applications (CTRL-ALT-DEL, ALT-F4 etc)
Contains functionalty to change the wallpaper
Creates an autostart registry key pointing to binary in C:\Windows
Drops executables to the windows directory (C:\Windows) and starts them
Found ransom note / readme
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Searches for Windows Mail specific files
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes many files with high entropy
Writes to foreign memory regions
Yara detected Venus Ransomware
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 724030 Sample: R0HzYUcMGy.exe Startdate: 16/10/2022 Architecture: WINDOWS Score: 100 57 Antivirus / Scanner detection for submitted sample 2->57 59 Multi AV Scanner detection for submitted file 2->59 61 Found ransom note / readme 2->61 63 2 other signatures 2->63 9 R0HzYUcMGy.exe 1 2 2->9         started        13 R0HzYUcMGy.exe 2->13         started        15 R0HzYUcMGy.exe 2->15         started        17 2 other processes 2->17 process3 file4 49 C:\Windows\R0HzYUcMGy.exe, PE32 9->49 dropped 79 Contains functionalty to change the wallpaper 9->79 81 Drops executables to the windows directory (C:\Windows) and starts them 9->81 83 Creates an autostart registry key pointing to binary in C:\Windows 9->83 85 Contains functionality to register hotkeys which are used to close and control applications (CTRL-ALT-DEL, ALT-F4 etc) 9->85 19 R0HzYUcMGy.exe 7 13 9->19         started        24 cmd.exe 1 9->24         started        signatures5 process6 dnsIp7 51 192.168.2.100 unknown unknown 19->51 53 192.168.2.101 unknown unknown 19->53 55 98 other IPs or domains 19->55 41 C:\Program Filesbehaviorgraphoogle\...\en-US.pak.venus, DOS 19->41 dropped 43 C:\Program Filesbehaviorgraphoogle\...\am.pak.venus, DOS 19->43 dropped 45 C:FI\Microsoft\...\bootmgfw.efi.mui.venus, COM 19->45 dropped 47 266 other files (265 malicious) 19->47 dropped 65 Multi AV Scanner detection for dropped file 19->65 67 Contains functionalty to change the wallpaper 19->67 69 Searches for Windows Mail specific files 19->69 71 Writes many files with high entropy 19->71 26 cmd.exe 1 19->26         started        73 Uses ping.exe to sleep 24->73 75 Uses ping.exe to check the status of other devices and networks 24->75 28 PING.EXE 1 24->28         started        30 conhost.exe 24->30         started        file8 signatures9 process10 process11 32 taskkill.exe 1 26->32         started        34 conhost.exe 26->34         started        36 svchost.exe 28->36 injected process12 38 consent.exe 2 36->38         started        signatures13 77 Writes to foreign memory regions 38->77
Threat name:
Win32.Trojan.Tiggre
Status:
Malicious
First seen:
2022-09-12 09:25:17 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
24 of 26 (92.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion persistence ransomware spyware stealer
Behaviour
Checks SCSI registry key(s)
Interacts with shadow copies
Kills process with taskkill
Modifies registry class
Runs ping.exe
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Sets desktop wallpaper using registry
Adds Run key to start application
Drops desktop.ini file(s)
Enumerates connected drives
Checks computer location settings
Deletes itself
Reads user/profile data of web browsers
Deletes backup catalog
Executes dropped EXE
Modifies extensions of user files
Deletes shadow copies
Modifies boot configuration data using bcdedit
Unpacked files
SH256 hash:
2b8de2ab99f0c1271a3fe04b9689bbf818ec771450136cf3b24b553ce4c61256
MD5 hash:
73e3e2e58320289a1a690a431747ab19
SHA1 hash:
961ba106df3c94839f930d3d6b03595eca0befc4
SH256 hash:
ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b
MD5 hash:
0e8476b3c4099a42baca7f16ca8253e6
SHA1 hash:
e044edce8646124ddc39906e6fb6f02eaff16161
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:QbotStuff
Author:anonymous

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments