MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f568d5c96eefd67d284787b804ab17a610a93dcc48d855515fb187f1b6dba249. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 14


Intelligence 14 IOCs YARA 10 File information Comments

SHA256 hash: f568d5c96eefd67d284787b804ab17a610a93dcc48d855515fb187f1b6dba249
SHA3-384 hash: 996b0cafa4573c16fe5c575add93bf451e82b298b5781611aa4496bd35197863b8ba82ef7666c7cbf1720eb226691bab
SHA1 hash: c52992ba04624bcd87696f9c37c9c708b3c15b9c
MD5 hash: af91873c641aab500eba3a3ad6f17b74
humanhash: papa-foxtrot-tennis-california
File name:file
Download: download sample
File size:4'946'299 bytes
First seen:2024-09-12 15:36:12 UTC
Last seen:2024-12-18 10:27:01 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b1c5b1beabd90d9fdabd1df0779ea832 (11 x CoinMiner, 10 x QuasarRAT, 8 x AsyncRAT)
ssdeep 98304:rqwLdiOqeEadJ1VQ7zuRN8BOBfKHXSBSQdkd0cr/ylwD+/lZUdmkUH0Tn8VIRgQp:rqwLb8/3SSQdkCtwq/lSJU+0Iz6o
TLSH T1D2361209E794ACF8E4A7D778C892160AE2B778588734D71F23A09E2D1F273609D37716
TrID 60.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
17.2% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
10.9% (.EXE) Win64 Executable (generic) (10523/12/4)
5.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
2.1% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
File icon (PE):PE icon
dhash icon b23333ba6b3a3230 (1 x RedLineStealer, 1 x Tomiris)
Reporter Bitsight
Tags:exe


Avatar
Bitsight
url: http://147.45.44.104/revada/66e30a27e0efe_tmpD.exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
373
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
f1.exe
Verdict:
Suspicious activity
Analysis date:
2024-09-12 13:24:21 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
Encryption Execution Generic Infostealer Network Static Stealth Trojan Malware
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% directory
Creating a process from a recently created file
DNS request
Connection attempt
Sending a custom TCP request
Running batch commands
Creating a process with a hidden window
Launching a process
Sending an HTTP GET request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm cmd fingerprint installer lolbin microsoft_visual_cc nanocore overlay packed packed setupapi sfx shdocvw shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
42 / 100
Signature
Found API chain indicative of debugger detection
Multi AV Scanner detection for submitted file
Sigma detected: Curl Download And Execute Combination
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1510220 Sample: file.exe Startdate: 12/09/2024 Architecture: WINDOWS Score: 42 31 wlnrar.shop 2->31 37 Multi AV Scanner detection for submitted file 2->37 39 Sigma detected: Curl Download And Execute Combination 2->39 9 file.exe 9 2->9         started        signatures3 process4 file5 27 C:\Users\user\AppData\...\winrar-info.exe, PE32+ 9->27 dropped 29 C:\Users\user\...\winrar-x64-701ru.exe, PE32+ 9->29 dropped 12 winrar-info.exe 9->12         started        16 winrar-x64-701ru.exe 1 24 9->16         started        process6 dnsIp7 35 wlnrar.shop 104.21.80.99, 443, 49732, 49737 CLOUDFLARENETUS United States 12->35 41 Found API chain indicative of debugger detection 12->41 18 cmd.exe 1 12->18         started        signatures8 process9 process10 20 curl.exe 2 18->20         started        23 cscript.exe 1 18->23         started        25 conhost.exe 18->25         started        dnsIp11 33 127.0.0.1 unknown unknown 20->33
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2024-09-05 14:52:04 UTC
File Type:
PE+ (Exe)
Extracted files:
996
AV detection:
16 of 24 (66.67%)
Threat level:
  2/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Unpacked files
SH256 hash:
db3d0484228ed14ad8d3763f4880d36024fb27b189c91720ff147b92d46bcb5a
MD5 hash:
04d3e794624a82228a7e683fdf22e182
SHA1 hash:
114b74e926913bb0a588e671025f9eb38e8b854b
SH256 hash:
bd3f01e7c100422a6faae60d76da16158f6d8b3868d474e81fd657ec3c0127ef
MD5 hash:
24f6faa5d2e9c8fb15ae0c936bfa4545
SHA1 hash:
17f85d25f0f0c15a164eb11a34f498268677dcb0
SH256 hash:
99e4d3d9cf4f315eed1833ebd0412ebf165a0840e2a9737272359c2db81772fc
MD5 hash:
cd25f972e64954e2a239dc71deba1543
SHA1 hash:
06f03a5d643ee843db318014b245742107ff4442
SH256 hash:
7b08daee81a32f72dbc10c5163b4d10eb48da8bb7920e9253be296774029f4ef
MD5 hash:
1e86c3bfcc0688bdbe629ed007b184b0
SHA1 hash:
793fada637d0d462e3511af3ffaec26c33248fac
SH256 hash:
7846ac61585b91c1da4b8d18679b34d2bd46985a656766c901371026d057b8f1
MD5 hash:
6aa46eba5ccaf1ff9a4104b798a4180e
SHA1 hash:
52e1a9595d408e04e17a5f0909a63e8f7561ddc4
SH256 hash:
476e3f779d2638238ea185df6019e4fcb54b3704ad12dbd051399fcf26e6e1bf
MD5 hash:
c5bcfd921f209366b9cfed632b174a3b
SHA1 hash:
332e2aeb7bc2d4491cbe4b994dbb8ff8e55fff9f
SH256 hash:
90427c2ddf21ff366637f1454ba70a151de8b70c559ae4888b8202a9c643cdeb
MD5 hash:
f6ee1154f195144d7616fe268b5a3005
SHA1 hash:
a0d36c7aadebc100bc1273f60278d3ec01f63a3f
SH256 hash:
f568d5c96eefd67d284787b804ab17a610a93dcc48d855515fb187f1b6dba249
MD5 hash:
af91873c641aab500eba3a3ad6f17b74
SHA1 hash:
c52992ba04624bcd87696f9c37c9c708b3c15b9c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Detect_APT29_WINELOADER_Backdoor
Author:daniyyell
Description:Detects APT29's WINELOADER backdoor variant used in phishing campaigns, this rule also detect bad pdf,shtml,htm and vbs or maybe more depends
Reference:https://cloud.google.com/blog/topics/threat-intelligence/apt29-wineloader-german-political-parties
Rule name:Detect_Malicious_VBScript_Base64
Author:daniyyell
Description:Detects malicious VBScript patterns, including Base64 decoding, file operations, and PowerShell.
Rule name:pe_detect_tls_callbacks
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe f568d5c96eefd67d284787b804ab17a610a93dcc48d855515fb187f1b6dba249

(this sample)

  
Dropped by
Privateloader
  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (FORCE_INTEGRITY)high
Reviews
IDCapabilitiesEvidence
GDI_PLUS_APIInterfaces with Graphicsgdiplus.dll::GdiplusStartup
gdiplus.dll::GdiplusShutdown
gdiplus.dll::GdipAlloc
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::AllocConsole
KERNEL32.dll::AttachConsole
KERNEL32.dll::WriteConsoleW
KERNEL32.dll::FreeConsole
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateHardLinkW
KERNEL32.dll::CreateFileW
KERNEL32.dll::CreateFileMappingW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
KERNEL32.dll::MoveFileExW

Comments