MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f512e47ce691f996f43e74cb07be9443f5aa34e1ebcdf3c52c9601da073ea779. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: f512e47ce691f996f43e74cb07be9443f5aa34e1ebcdf3c52c9601da073ea779
SHA3-384 hash: 3f5ac666d7053628dd1afd079a6c41e001204ec20eadfa8e3ee86b0ed209de5ae301760d1aed73c9b83e585b463f9167
SHA1 hash: f585515c607d3a070bc16b97cad255856e930616
MD5 hash: e0195c4ca8f838672836ac80b4195517
humanhash: island-bulldog-nevada-massachusetts
File name:Binance Mega Treasure Hunt.exe
Download: download sample
File size:164'352 bytes
First seen:2020-12-20 07:57:14 UTC
Last seen:2020-12-20 09:34:16 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'662 x AgentTesla, 19'477 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 3072:oIKesH5cjqbN/l71vJpVZ0y13knCgmgZZo/dr2/eP:otv5cjwxvHVZ0y1UCgVZ+dr2/e
Threatray 21 similar samples on MalwareBazaar
TLSH EBF3396731DA1ECCDCDE9AFE5E196CF25767FDAEC322A0953A11A02A04C3141B52E71C
Reporter abuse_ch
Tags:exe


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: mailer.binance.com
Sending IP: 185.244.38.210
From: Binance<do_not_reply@mailer.binance.com>
Subject: 12 Days of Christmas Treasure Hunt! N100,000 Worth of Prizes to be won!
Attachment: Binance Mega Treasure Hunt 12 Word Phrase.img (contains "Binance Mega Treasure Hunt.exe")

Intelligence


File Origin
# of uploads :
2
# of downloads :
131
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Binance Mega Treasure Hunt.exe
Verdict:
Suspicious activity
Analysis date:
2020-12-20 07:59:03 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Launching a process
Creating a file
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Gathering data
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
72 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2020-12-19 03:44:18 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Drops startup file
Unpacked files
SH256 hash:
5026b4d5a20d9bd7f07f111adbfdcdffa3423e83a1f5a982c1c34ad610eaa678
MD5 hash:
51aed80bd9770c6cd1f8782f1e37eeaa
SHA1 hash:
9130e5240d562529ff74c9664fa906168a11012d
SH256 hash:
1ef845e3579fc14e73cf682db3455832da2cd3e18f31a71f164fd5151c453b6e
MD5 hash:
bc0fca3ef87f171176964c4b4246fe1a
SHA1 hash:
c5b456fffd0c12c48c6ba49b5ee25d417576e9cb
SH256 hash:
f512e47ce691f996f43e74cb07be9443f5aa34e1ebcdf3c52c9601da073ea779
MD5 hash:
e0195c4ca8f838672836ac80b4195517
SHA1 hash:
f585515c607d3a070bc16b97cad255856e930616
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe f512e47ce691f996f43e74cb07be9443f5aa34e1ebcdf3c52c9601da073ea779

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments