MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f7125019233ca9714d5b2b16ef66119c37bc9033597f0c39e9defa1dc0f5c1df. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TA505


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: f7125019233ca9714d5b2b16ef66119c37bc9033597f0c39e9defa1dc0f5c1df
SHA3-384 hash: b048e6d47794630c7680208c85290dc417986c5fc7b884b39bd71f4f33443cf83d1bb83f6fcd0d6219104ea110228faa
SHA1 hash: 9f34f0590d3c19153a800cdaea19b1ce4ba26cb6
MD5 hash: 36af9b047a76cd1e37a8188d8ad4119d
humanhash: johnny-dakota-eight-xray
File name:srt_join2.bin
Download: download sample
Signature TA505
File size:274'304 bytes
First seen:2020-08-25 12:41:01 UTC
Last seen:2020-08-25 14:14:08 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash cdf5bfe175bda0bb60d50a48dd0ca746 (1 x TA505)
ssdeep 6144:zU0DDlOPbQ6+aKVelI7PuUMtgE6+KFlBNJXjq7fAbaUXy:z3Dl83vpymUagYCHNJTI4baH
Threatray 5 similar samples on MalwareBazaar
TLSH D044CFA7DB57B1EEF952D630E5A47A337E353918A12C8EAE43D047840FC3690E9F9148
Reporter JAMESWT_WT
Tags:64bit dll TA505

Code Signing Certificate

Organisation:Ekitai Data Inc.
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:Aug 25 00:00:00 2020 GMT
Valid to:Aug 25 23:59:59 2021 GMT
Serial number: B8164F7143E1A313003AB0C834562F1F
Intelligence: 4 malware samples on MalwareBazaar are signed with this code signing certificate
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: 263C636C5DE68F0CD2ADF31B7AEBC18A5E00FC47A5E2124E2A5613B9A0247C1E
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
172
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
A
b
c
d
e
f
i
l
M
n
o
r
S
t
u
V
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 276898 Sample: srt_join2.bin Startdate: 25/08/2020 Architecture: WINDOWS Score: 48 14 Multi AV Scanner detection for submitted file 2->14 6 loaddll64.exe 1 2->6         started        process3 process4 8 rundll32.exe 6->8         started        10 rundll32.exe 6->10         started        12 rundll32.exe 6->12         started       
Threat name:
Win64.Trojan.GraceWire
Status:
Malicious
First seen:
2020-08-25 12:19:25 UTC
File Type:
PE+ (Dll)
Extracted files:
2
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
loader
Behaviour
TA505 Loader
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments