MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f86962682a031e037476ea11e8f19b584e0cb19ef80da2af997e0aa64e13b586. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: f86962682a031e037476ea11e8f19b584e0cb19ef80da2af997e0aa64e13b586
SHA3-384 hash: 60c23e59bea81db6eb3d907896faffb94edcc4ac245bc3dd5af07b8b658e88b36df16a7a60bbfebb4276d647d4eab540
SHA1 hash: c116bbf0fa2a7c1768804ca0cc537fb03aeb5bfa
MD5 hash: 319c2135f99c822e2e7a172f9896ed56
humanhash: pip-cat-muppet-charlie
File name:Loader.dll
Download: download sample
File size:2'129'075 bytes
First seen:2023-05-11 07:00:59 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
ssdeep 49152:Lv9j5xUtBOve9Z0gFxvKx7w5sskl5ON93oqMeQHN:Lv9j5xUGeYovKxhskl5ONtoqQHN
Threatray 57 similar samples on MalwareBazaar
TLSH T193A56B85A692DE2BD3826B3AA023C6685631D2023723F75FDFBE52743C93B7409417E5
TrID 22.6% (.SCR) Windows screen saver (13097/50/3)
18.1% (.EXE) Win64 Executable (generic) (10523/12/4)
17.2% (.EXE) DOS Borland compiled Executable (generic) (10000/1/2)
11.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
8.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter 0xToxin
Tags:BlindEagle DIANColombia dll


Avatar
0xToxin
http://172.174.176.153/dll/new_rump_vb.net.txt

Intelligence


File Origin
# of uploads :
1
# of downloads :
275
Origin country :
IL IL
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Verdict:
No Threat
Threat level:
  10/10
Confidence:
100%
Tags:
overlay
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
48 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 863566 Sample: Loader.dll Startdate: 11/05/2023 Architecture: WINDOWS Score: 48 36 .NET source code contains method to dynamically call methods (often used by packers) 2->36 38 .NET source code references suspicious native API functions 2->38 14 loaddll32.exe 1 2->14         started        process3 process4 16 cmd.exe 1 14->16         started        18 conhost.exe 14->18         started        process5 20 rundll32.exe 16->20         started        process6 22 rundll32.exe 20->22         started        process7 24 rundll32.exe 22->24         started        process8 26 rundll32.exe 24->26         started        process9 28 rundll32.exe 26->28         started        process10 30 rundll32.exe 28->30         started        process11 32 rundll32.exe 30->32         started        process12 34 rundll32.exe 32->34         started       
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
f86962682a031e037476ea11e8f19b584e0cb19ef80da2af997e0aa64e13b586
MD5 hash:
319c2135f99c822e2e7a172f9896ed56
SHA1 hash:
c116bbf0fa2a7c1768804ca0cc537fb03aeb5bfa
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments