MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 efd64c0b88bbe45461d13b2a0acd9544218f819f4579af35b5fc92e20d5f6fa5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Expiro


Vendor detections: 15


Intelligence 15 IOCs YARA 6 File information Comments

SHA256 hash: efd64c0b88bbe45461d13b2a0acd9544218f819f4579af35b5fc92e20d5f6fa5
SHA3-384 hash: bf80aafd1ac2bfaa7b9022ee20bb7dcc4830c675c3b598c532ad667d1af87ecbd46d47dc52e8a7482da46bb57733d5ad
SHA1 hash: 238f5ddcd0193aba7b760b7ab6f3f982d73383b5
MD5 hash: 06c13587e9a7af60860cb6e2c4f3a7b2
humanhash: yellow-quiet-black-october
File name:RFQ_PO N89397-GM7287-Order.bat
Download: download sample
Signature Expiro
File size:1'432'064 bytes
First seen:2024-11-28 21:42:22 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:y1zGUxjCMfFrJirFpgEZR4IGqiHVtAgjSN9/pggC0gPAMhCKqX:0L/9QrF/ZR4DH4/begC0WAfZ
Threatray 1'286 similar samples on MalwareBazaar
TLSH T19465018D3125B18FC497C9708A54ED78EA746CAA9B0BC203D5E31EEFBD1D5879E041E2
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
File icon (PE):PE icon
dhash icon 7474666674389882 (2 x PureLogsStealer, 2 x AgentTesla, 1 x Expiro)
Reporter TeamDreier
Tags:exe Expiro

Intelligence


File Origin
# of uploads :
1
# of downloads :
430
Origin country :
DK DK
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
RFQ_PO N89397-GM7287-Order.bat
Verdict:
Malicious activity
Analysis date:
2024-11-28 21:44:08 UTC
Tags:
evasion snake keylogger expiro sinkhole m0yv netreactor ims-api generic

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
shellcode dropper trojan
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Creating a file
Modifying an executable file
Launching a service
Connection attempt to an infection source
Searching for synchronization primitives
Modifying a system executable file
Creating a file in the Windows subdirectories
Loading a system driver
Forced shutdown of a system process
Enabling autorun for a service
Query of malicious DNS domain
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Unauthorized injection to a system process
Infecting executable files
Sending an HTTP POST request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
masquerade obfuscated packed packed packer_detected vbnet
Malware family:
Snake Keylogger
Verdict:
Malicious
Result
Threat name:
MassLogger RAT, PureLog Stealer
Detection:
malicious
Classification:
spre.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to behave differently if execute on a Russian/Kazak computer
Creates files in the system32 config directory
Creates files inside the volume driver (system volume information)
Drops executable to a common third party application directory
Found direct / indirect Syscall (likely to bypass EDR)
Infects executable files (exe, dll, sys, html)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected MassLogger RAT
Yara detected PureLog Stealer
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1564874 Sample: RFQ_PO N89397-GM7287-Order.... Startdate: 28/11/2024 Architecture: WINDOWS Score: 100 61 reallyfreegeoip.org 2->61 63 zlenh.biz 2->63 65 19 other IPs or domains 2->65 73 Suricata IDS alerts for network traffic 2->73 75 Malicious sample detected (through community Yara rule) 2->75 77 Antivirus detection for dropped file 2->77 81 17 other signatures 2->81 8 RFQ_PO N89397-GM7287-Order.bat.exe 7 2->8         started        12 YRtQgzFlDnVSru.exe 2->12         started        14 elevation_service.exe 2->14         started        16 20 other processes 2->16 signatures3 79 Tries to detect the country of the analysis system (by using the IP) 61->79 process4 file5 51 C:\Users\user\AppData\...\YRtQgzFlDnVSru.exe, PE32 8->51 dropped 53 C:\...\YRtQgzFlDnVSru.exe:Zone.Identifier, ASCII 8->53 dropped 55 C:\Users\user\AppData\Local\...\tmpE707.tmp, XML 8->55 dropped 57 C:\...\RFQ_PO N89397-GM7287-Order.bat.exe.log, ASCII 8->57 dropped 93 Writes to foreign memory regions 8->93 95 Allocates memory in foreign processes 8->95 97 Adds a directory exclusion to Windows Defender 8->97 18 vbc.exe 15 3 8->18         started        23 powershell.exe 23 8->23         started        25 powershell.exe 23 8->25         started        27 schtasks.exe 1 8->27         started        99 Injects a PE file into a foreign processes 12->99 29 vbc.exe 12->29         started        31 schtasks.exe 12->31         started        59 C:\Windows\System32\sppsvc.exe, PE32+ 14->59 dropped 101 Infects executable files (exe, dll, sys, html) 14->101 103 Found direct / indirect Syscall (likely to bypass EDR) 14->103 105 Creates files inside the volume driver (system volume information) 16->105 107 Creates files in the system32 config directory 16->107 109 Contains functionality to behave differently if execute on a Russian/Kazak computer 16->109 signatures6 process7 dnsIp8 67 vjaxhpbji.biz 82.112.184.197, 49806, 49808, 49852 FIRST_LINE-SP_FOR_B2B_CUSTOMERSUPSTREAMSRU Russian Federation 18->67 69 reallyfreegeoip.org 104.21.67.152, 443, 49725, 49759 CLOUDFLARENETUS United States 18->69 71 4 other IPs or domains 18->71 43 C:\Windows\System32\wbengine.exe, PE32+ 18->43 dropped 45 C:\Windows\System32\wbem\WmiApSrv.exe, PE32+ 18->45 dropped 47 C:\Windows\System32\vds.exe, PE32+ 18->47 dropped 49 150 other malicious files 18->49 dropped 83 Tries to steal Mail credentials (via file / registry access) 18->83 85 Drops executable to a common third party application directory 18->85 87 Infects executable files (exe, dll, sys, html) 18->87 89 Loading BitLocker PowerShell Module 23->89 33 conhost.exe 23->33         started        35 WmiPrvSE.exe 23->35         started        37 conhost.exe 25->37         started        39 conhost.exe 27->39         started        91 Tries to harvest and steal browser information (history, passwords, etc) 29->91 41 conhost.exe 31->41         started        file9 signatures10 process11
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2024-11-28 19:11:23 UTC
File Type:
PE (.Net Exe)
Extracted files:
12
AV detection:
26 of 38 (68.42%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
collection discovery execution spyware stealer
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Modifies data under HKEY_USERS
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy WMI provider
Uses Volume Shadow Copy service COM API
outlook_office_path
outlook_win_path
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Uses the VBS compiler for execution
Command and Scripting Interpreter: PowerShell
Unpacked files
SH256 hash:
abdd6f31a909b0b10e30ced74a1f6f037adf1f61a8a842048dbc254d6f076169
MD5 hash:
c33a7f0e25bb3f4d3c19fc8441e9d12b
SHA1 hash:
0286b277e97b9f7c217a0d029e8144f8e20b40b9
SH256 hash:
f75d5fecbaa93cc3cc9d638547b1d8853eb90129bc3177fb668901f778bca2ca
MD5 hash:
8cd9c60ca0136ad6c9c315eff7e32386
SHA1 hash:
d744457240c20c1c6a94eee57fef10d85dc1c3fa
Detections:
win_masslogger_w0 win_404keylogger_g1 SUSP_OBF_NET_Reactor_Indicators_Jan24 RedLine_Campaign_June2021
SH256 hash:
04aa6ac12185e6e0fe89465129eb9ea03aad8eea783a0bead6032e45c7062409
MD5 hash:
71ecf732d1548aecc8e344b173e98e96
SHA1 hash:
0bd8ff079864fec7bf7cb42f1c97c7957032ed1f
Detections:
win_masslogger_w0 win_404keylogger_g1 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
e47937bb60de1516186addfa5e42df9789e489b658bc2857dededcf56e62990e
MD5 hash:
2ea5f9ef9bb74720cb1cc812778a086c
SHA1 hash:
aee6e40202c8384325302ea1fd37185b17da4648
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
4f26137e5b2fd6d306bc7ce14eca701a24c69c2911abb2cf4f2c7cd634751728
MD5 hash:
4b6b388c90e35368a0be7c6e90203c04
SHA1 hash:
55859e166e9947bf91151ccd55973ca20441500b
Detections:
MAL_Malware_Imphash_Mar23_1 MALWARE_Win_RedLine SUSP_OBF_NET_Reactor_Native_Stub_Jan24
SH256 hash:
e1d6bdaadfd3a1318dfbac7e45a6e344232992fe0c519ac4387631d29cc2ae29
MD5 hash:
d3800b7d259d297ea265ffbf87a1c8bc
SHA1 hash:
32b6fce997617a06036d424da1a5a0002c20e861
Detections:
MAL_Malware_Imphash_Mar23_1 MALWARE_Win_RedLine SUSP_OBF_NET_Reactor_Native_Stub_Jan24
SH256 hash:
efd64c0b88bbe45461d13b2a0acd9544218f819f4579af35b5fc92e20d5f6fa5
MD5 hash:
06c13587e9a7af60860cb6e2c4f3a7b2
SHA1 hash:
238f5ddcd0193aba7b760b7ab6f3f982d73383b5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Expiro

Executable exe efd64c0b88bbe45461d13b2a0acd9544218f819f4579af35b5fc92e20d5f6fa5

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments