MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f7d2fa51abb13fda6023fc4959328f815b6d9400beeb6a9bf1af1696cc6c0faa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



KeyBase


Vendor detections: 5


Intelligence 5 IOCs YARA 5 File information Comments

SHA256 hash: f7d2fa51abb13fda6023fc4959328f815b6d9400beeb6a9bf1af1696cc6c0faa
SHA3-384 hash: 3e7d9659794a1b88949e06e8abc20a03716458d97c7fa3704398598bae05377956a4b4eed3e55f8bc312702e89d1b69a
SHA1 hash: 382a7a47249d8d0e619cdd2491a80267e18714d8
MD5 hash: 4108785cacf4c5167421745a5ac00421
humanhash: kilo-moon-apart-tennessee
File name:190409081098932.doc
Download: download sample
Signature KeyBase
File size:35'328 bytes
First seen:2020-10-22 08:47:16 UTC
Last seen:2020-10-22 10:17:11 UTC
File type:Word file doc
MIME type:application/msword
ssdeep 384:siSY5UgNfCV+dQzs9HcRK68gZ8K60jXRvLp/Yqyto:i7V+ds2Hcz8nFIRm
TLSH 61F28311B292DD1BE2A045344EC7CBEA737D7D0A9E02830B3254BB6EBC397B49B55790
Reporter abuse_ch
Tags:doc KeyBase


Avatar
abuse_ch
Malspam distributing KeyBase:

HELO: mana0.llebez.com
Sending IP: 161.35.100.215
From: Rodney Kaith Downing<lynsamways@totalise.co.uk>
Reply-To: fitolvos@gmail.com
Subject: Loan Offer
Attachment: 190409081098932.doc

Keybase payload URL:
https://shabbonafireworks.com/securefile.exe

KeyBase C2:
http://buzzcourer.com/dxb/apn/keybase/login.php/image/upload.php

Intelligence


File Origin
# of uploads :
2
# of downloads :
119
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Sending a custom TCP request by exploiting the app vulnerability
Result
Threat name:
MailPassView
Detection:
malicious
Classification:
phis.troj.spyw.expl.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded VBA with functions possibly related to ADO stream file operations
Document contains an embedded VBA with functions possibly related to HTTP operations
Document contains an embedded VBA with many randomly named variables
Document exploit detected (creates forbidden files)
Document exploit detected (drops PE files)
Document exploit detected (process start blacklist hit)
Found C&C like URL pattern
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Office process drops PE file
Passes username and password via HTTP get
Searches for Windows Mail specific files
Sigma detected: MS Office Product Spawning Exe in User Dir
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Tries to steal Mail credentials (via file registry)
Yara detected MailPassView
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 302594 Sample: 190409081098932.doc Startdate: 22/10/2020 Architecture: WINDOWS Score: 100 39 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->39 41 Multi AV Scanner detection for domain / URL 2->41 43 Antivirus detection for dropped file 2->43 45 15 other signatures 2->45 8 WINWORD.EXE 296 41 2->8         started        process3 dnsIp4 31 shabbonafireworks.com 192.185.169.180, 443, 49167 UNIFIEDLAYER-AS-1US United States 8->31 25 C:\Users\user\AppData\...\securefile[1].exe, PE32 8->25 dropped 27 C:\Users\user\AppData\LocalAiPRL.exe, PE32 8->27 dropped 55 Document exploit detected (creates forbidden files) 8->55 57 Document exploit detected (process start blacklist hit) 8->57 13 LocalAiPRL.exe 2 8->13         started        file5 signatures6 process7 signatures8 59 Antivirus detection for dropped file 13->59 61 Tries to steal Mail credentials (via file registry) 13->61 63 Machine Learning detection for dropped file 13->63 65 Injects a PE file into a foreign processes 13->65 16 LocalAiPRL.exe 12 4 13->16         started        process9 dnsIp10 29 buzzcourer.com 185.196.8.138, 49170, 49171, 49172 SIMPLECARRER2IT Switzerland 16->29 33 Tries to steal Instant Messenger accounts or passwords 16->33 35 Installs a global keyboard hook 16->35 37 Injects a PE file into a foreign processes 16->37 20 LocalAiPRL.exe 1 16->20         started        23 LocalAiPRL.exe 2 16->23         started        signatures11 process12 signatures13 47 Tries to steal Instant Messenger accounts or passwords 20->47 49 Tries to steal Mail credentials (via file access) 20->49 51 Searches for Windows Mail specific files 20->51 53 Tries to harvest and steal browser information (history, passwords, etc) 23->53
Threat name:
Document-Word.Downloader.SLoad
Status:
Malicious
First seen:
2020-10-22 07:36:08 UTC
AV detection:
19 of 29 (65.52%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Checks processor information in registry
Enumerates system info in registry
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Office loads VBA resources, possible macro or embedded object present
Suspicious use of SetThreadContext
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:KeyBase
Author:@bartblaze
Description:Identifies KeyBase aka Kibex.
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:MALW_KeyBase
Author:@bartblaze
Description:Identifies KeyBase aka Kibex.
Rule name:Office_AutoOpen_Macro
Author:Florian Roth
Description:Detects an Microsoft Office file that contains the AutoOpen Macro function
Rule name:win_keybase_w0
Author:@bartblaze
Description:Identifies KeyBase aka Kibex.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

KeyBase

Word file doc f7d2fa51abb13fda6023fc4959328f815b6d9400beeb6a9bf1af1696cc6c0faa

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments