MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f7c1aa4164f0c17980bba13ab571ef20deaf60a3444266b7436f8de6bdace5be. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: f7c1aa4164f0c17980bba13ab571ef20deaf60a3444266b7436f8de6bdace5be
SHA3-384 hash: e631c6f9c206477c4910d9169a8dfed573a127be9d6adf781ae1d6db471ebef53e247674c846cdc49e807f98ff300b4e
SHA1 hash: 55472e826f82ca5610ccb1a5dc0d0865ef08166f
MD5 hash: 6c53dc02df6b42fb589f7afd0b374557
humanhash: washington-papa-ink-august
File name:SecuriteInfo.com.Gen.Variant.Lazy.196912.13979.1771
Download: download sample
File size:2'867'555 bytes
First seen:2022-06-17 11:59:50 UTC
Last seen:2022-06-17 12:39:54 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e569e6f445d32ba23766ad67d1e3787f (259 x Adware.Generic, 41 x RecordBreaker, 24 x RedLineStealer)
ssdeep 49152:tBuZrEUoCGbyKdGhw1bumdwA1RQNtiBt5X355DdN7POGjK:7kLEmKdGhSu9A7etOtB355ljK
TLSH T1B2D5F13FF268A53EC5AE1B3145B38220997BBA61681B8C1E47FC344CCF765601E3B656
TrID 49.7% (.EXE) Inno Setup installer (109740/4/30)
19.5% (.EXE) InstallShield setup (43053/19/16)
18.8% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
4.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 5050d270cccc82ae (109 x Adware.Generic, 43 x LummaStealer, 42 x OffLoader)
Reporter SecuriteInfoCom
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
239
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckNumberOfProcessor
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
overlay packed setupapi.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj
Score:
42 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Performs DNS queries to domains with low reputation
Yara detected Generic Downloader
Behaviour
Behavior Graph:
Threat name:
Win32.Dropper.Convagent
Status:
Malicious
First seen:
2022-06-12 01:38:59 UTC
File Type:
PE (Exe)
AV detection:
6 of 41 (14.63%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
1b17a62cc47c2c08b3fe045333fec3562ce658a8112d7bba9456a8ddda401126
MD5 hash:
2faffd368c0b1f8834129d164b10d5c0
SHA1 hash:
5b1593b15f2cbabfb34495590a786297c80ae1a5
SH256 hash:
a6e2bacbdf15ca15339831af3ced389a2071d930d60f91a418163f04ae2216b3
MD5 hash:
6ee65401fbe040d8f477481f46874deb
SHA1 hash:
3b8b840b2f0b22f64fcf9968fe72bed275b25263
SH256 hash:
c9116da2441eaeaf72e98efc3f0bbf1c3bcf34afa336423867d2b9a5b5d033a6
MD5 hash:
60aec59bc134998b91b36c58009fb865
SHA1 hash:
be8a98c6eecc42cc02c6dd3a7a1e1eef2d5d6aab
SH256 hash:
f7c1aa4164f0c17980bba13ab571ef20deaf60a3444266b7436f8de6bdace5be
MD5 hash:
6c53dc02df6b42fb589f7afd0b374557
SHA1 hash:
55472e826f82ca5610ccb1a5dc0d0865ef08166f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:exploit_any_poppopret
Author:Jeff White [karttoon@gmail.com] @noottrak
Description:Identify POP -> POP -> RET opcodes for quick ROP Gadget creation in target binaries.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe f7c1aa4164f0c17980bba13ab571ef20deaf60a3444266b7436f8de6bdace5be

(this sample)

  
Delivery method
Distributed via web download

Comments