MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ee0e754ae6cc20656a4c2a4f43b25978fa0d725136a880b7924c1395f6b30e9b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Babadeda
Vendor detections: 9
| SHA256 hash: | ee0e754ae6cc20656a4c2a4f43b25978fa0d725136a880b7924c1395f6b30e9b |
|---|---|
| SHA3-384 hash: | 90e1cc4c9e456cd59470941989d7dbe70881e5f1cfad17aec92972729ffaf6b13fdf0d302e5df9bd9ea886ee7f85c608 |
| SHA1 hash: | baf805e054b9b392b53412d6ab6cea171c9d77ac |
| MD5 hash: | d290b5ba66f5ab9129b8195b9a616b30 |
| humanhash: | pizza-moon-louisiana-mexico |
| File name: | d290b5ba66f5ab9129b8195b9a616b30 |
| Download: | download sample |
| Signature | Babadeda |
| File size: | 243'064 bytes |
| First seen: | 2022-04-04 16:20:57 UTC |
| Last seen: | 2022-04-04 17:07:52 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 56a78d55f3f7af51443e58e0ce2fb5f6 (720 x GuLoader, 451 x Formbook, 295 x Loki) |
| ssdeep | 6144:HNeZmfze6ldHqQ7s+sCpky3IJkBptsFHK:HNlfRldKu5YJ8cq |
| Threatray | 130 similar samples on MalwareBazaar |
| TLSH | T19A3412291FA1C073EA6305700EBE9713EFF3942015789A8707569FBD7620E82D63E799 |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | 32 Babadeda exe |
Intelligence
File Origin
# of uploads :
2
# of downloads :
221
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
402c5e5d6b4f4e14ae9b6b1e271ddaaa
Verdict:
Malicious activity
Analysis date:
2022-04-04 20:30:06 UTC
Tags:
exploit CVE-2017-11882 loader
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Launching a process
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
Babadeda
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
Detected unpacking (overwrites its own PE header)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Injects a PE file into a foreign processes
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Powershell drops PE file
Sigma detected: Execution from Suspicious Folder
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: Windows Shell File Write to Suspicious Folder
Yara detected Babadeda
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.NSISInject
Status:
Malicious
First seen:
2022-04-04 14:27:32 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
23 of 26 (88.46%)
Threat level:
5/5
Verdict:
unknown
Similar samples:
+ 120 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
8/10
Tags:
pyinstaller
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Detects Pyinstaller
Enumerates physical storage devices
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
Unpacked files
SH256 hash:
be6d2613b6a238f93fc3edfa674eef1fd411c73afe53d328052437a5f52a0f95
MD5 hash:
fa8c4672613ab6e0d31a3ea31d3b506a
SHA1 hash:
4da5071bd849d5b7df28d227d2705a21eba81909
SH256 hash:
6e0475b8c3b16ac2999fc4cc9b4bf29fdfe98fb98ea4979b86b300846ecbe922
MD5 hash:
10e4cc1206a9d51f61513d421c7e1150
SHA1 hash:
558f7ce08b0b51758daaf80c6848f3f60ce8c4d8
SH256 hash:
d84a49fc9e6c2db17bfc1ef09fdcac763214ade15966f1243152b3e799f730bb
MD5 hash:
845acf3accb15dd1b3f25bd9864e2e46
SHA1 hash:
7a192374318a5e5caf1c935ff2f21ae2b84df2f3
SH256 hash:
ee0e754ae6cc20656a4c2a4f43b25978fa0d725136a880b7924c1395f6b30e9b
MD5 hash:
d290b5ba66f5ab9129b8195b9a616b30
SHA1 hash:
baf805e054b9b392b53412d6ab6cea171c9d77ac
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://saraparedesrectora.cl/wp-content/plugins/ywjnmetzpw/grace.jpg