MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Deathransom


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b
SHA3-384 hash: 8d3abe0fd712b7ca5b7cde66a9afac3f6b603151865efeb048fbe022e67adca113c8b4dd34ba97ff450da0fc85bea7a5
SHA1 hash: e495204839417ab64d7b146279c56c25c2815b1f
MD5 hash: 262fdac1291740ba9408d06da265dd9f
humanhash: ten-lion-carpet-yankee
File name:Deathransom (2)
Download: download sample
Signature Deathransom
File size:196'608 bytes
First seen:2020-08-03 15:07:53 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a4e1ff10d083ff95995012e5b2cbc654 (1 x Deathransom)
ssdeep 3072:K75DzyLgv8vT6nRc24odbkDXFwzIc3jiptvwF:GDjv8v44o+X3pWF
Threatray 254 similar samples on MalwareBazaar
TLSH E7148F02E4618932C7FA4A7594F786655B3D3202EF761F1F116CE2582FD32C222A7B5E
Reporter JAMESWT_WT
Tags:Deathransom

Intelligence


File Origin
# of uploads :
1
# of downloads :
124
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
Creating a file
Creating a file in the mass storage device
Encrypting user's files
Result
Threat name:
Deathransom
Detection:
malicious
Classification:
rans.evad
Score:
68 / 100
Signature
Country aware sample found (crashes after keyboard check)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Writes a notice file (html or txt) to demand a ransom
Yara detected Deathransom
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.CryptInject
Status:
Malicious
First seen:
2019-11-16 12:43:37 UTC
File Type:
PE (Exe)
Extracted files:
8
AV detection:
22 of 26 (84.62%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
ransomware
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Program crash
Drops desktop.ini file(s)
Drops desktop.ini file(s)
Modifies extensions of user files
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments