MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fa0dc33a3de4aef67a0a81cde65289d008650d56ec8b837a81762156824d4eef. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments 1

SHA256 hash: fa0dc33a3de4aef67a0a81cde65289d008650d56ec8b837a81762156824d4eef
SHA3-384 hash: a09776c0b603ae951b626cee4ec97df6a4ea8daa91951baa29dda220e79d701cab7d37b037eaf3a8222b239e5afe4f50
SHA1 hash: bef74ae1aea3329ad85a4d8e20f669709168f433
MD5 hash: a5f82322016f49755fc66a0864dc93f2
humanhash: mobile-speaker-oscar-video
File name:wmac.exe
Download: download sample
File size:1'824'529 bytes
First seen:2021-05-07 04:45:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ffca4b8182ebb8822b4187a5e1e23e14
ssdeep 24576:IaUxvxK4u/prLB0wVBPxhXJe7vGF22D8DM/KgF44gZ6c9x3ci64JY6gZszOYABtx:kJKNl0wrxIyhKgzgZFcmJYt6bYG+
Threatray 77 similar samples on MalwareBazaar
TLSH 08852312BAC1C073E9933830C9B5D630AB79B970A73A5507BFE02E5E7A703E59A11753
Reporter starsSk87264403
Tags:trojan-dropper

Intelligence


File Origin
# of uploads :
1
# of downloads :
149
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://download.adlice.com/api/?action=download&app=roguekiller&type=x86
Verdict:
Malicious activity
Analysis date:
2019-02-27 20:05:16 UTC
Tags:
opendir loader keylogger hawkeye stealer evasion trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Creating a file in the Windows subdirectories
Enabling the 'hidden' option for recently created files
Running batch commands
Launching a process
Using the Windows Management Instrumentation requests
Creating a process from a recently created file
DNS request
Sending a UDP request
Launching cmd.exe command interpreter
Launching a tool to kill processes
Forced shutdown of a system process
Forced shutdown of a browser
Sending an HTTP GET request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
80 / 100
Signature
Drops batch files with force delete cmd (self deletion)
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with a suspicious file extension
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Behaviour
Behavior Graph:
Threat name:
Win32.Dropper.Gamaredon
Status:
Malicious
First seen:
2015-05-28 14:59:05 UTC
File Type:
PE (Exe)
Extracted files:
249
AV detection:
17 of 28 (60.71%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Kills process with taskkill
Modifies Internet Explorer settings
Modifies registry class
Enumerates physical storage devices
Drops file in Windows directory
Loads dropped DLL
Executes dropped EXE
UPX packed file
Unpacked files
SH256 hash:
9ab8b64f98f402aeeec8a75d69c5d848c6484bb51350dcf50d37bf1ba7a197b1
MD5 hash:
4a355d7fc89a99c9f3ddccc0afeb8836
SHA1 hash:
9f0230b2ad18294ab2e13e4cdcfefdd732d94cf9
SH256 hash:
aebdbdd33041a962e6fdca8171c14c45be8489fe940e2645679aebfffc531925
MD5 hash:
244c9e3245a97f419b65587abc8766c5
SHA1 hash:
340dce8d1bbc2c64fa3fe732d4a67376d67ed1af
SH256 hash:
eb2a267a71aaac6674d02ff88edfb2bf0653c93ba2766c92137ff05cc10423da
MD5 hash:
82866235e57e4b49036de49f65c68b46
SHA1 hash:
db0fd5578af5c9f3d1f9c48354fbb54954723711
SH256 hash:
3c66b5ae66d4702f8e87e5b8185588aadab9394cb239d23878964dc0584ab3f3
MD5 hash:
0bf3b6f3680c249d6467b94ca53408f2
SHA1 hash:
b498364f11f555dd251a0b8c1ffe60f3867885a3
SH256 hash:
e80a9184668f4d3c957b33ce8e9b70dde09dfdb7114828d84e98458a55d9bc8d
MD5 hash:
245035221226575b640e37f2e4117e2f
SHA1 hash:
86144c2776df0524476201a49efd0eebd3a608a6
SH256 hash:
0377585ec50ed2e1b3d8519be272599f31024accd20b484ddae8240e09cc83b4
MD5 hash:
13d3997b43c3d5cbafb0ff10b6f0dee1
SHA1 hash:
e650a76f3fa8d28e2ff3751ccf44d124ef2b82bd
SH256 hash:
ad80064f71d273967dcf0b14b9cd6e84d79a132231d619687d9266c7807bdfe0
MD5 hash:
a35ee23aaab26afc575ac83df9572b57
SHA1 hash:
81ea38c694ce9702faddfb961f17c1bbf628a76d
SH256 hash:
e37aa72bca3cecb9bdbe51cbd81ec1143bb17163088a1379a4ccb93f5d881e76
MD5 hash:
5cac4fe734fc8454ccb847e030beee38
SHA1 hash:
34298fe220e35f614b2c837cf1dc2604ab0882d6
SH256 hash:
fa0dc33a3de4aef67a0a81cde65289d008650d56ec8b837a81762156824d4eef
MD5 hash:
a5f82322016f49755fc66a0864dc93f2
SHA1 hash:
bef74ae1aea3329ad85a4d8e20f669709168f433
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe fa0dc33a3de4aef67a0a81cde65289d008650d56ec8b837a81762156824d4eef

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-07 05:04:37 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0001.032] Anti-Behavioral Analysis::Timing/Delay Check GetTickCount
1) [C0002.010] Communication Micro-objective::IWebBrowser::HTTP Communication
2) [C0029.002] Cryptography Micro-objective::SHA1::Cryptographic Hash
3) [C0029.003] Cryptography Micro-objective::SHA256::Cryptographic Hash
4) [C0031.001] Cryptography Micro-objective::AES::Decrypt Data
5) [C0027.009] Cryptography Micro-objective::RC4::Encrypt Data
6) [C0021.004] Cryptography Micro-objective::RC4 PRGA::Generate Pseudo-random Sequence
7) [C0032.001] Data Micro-objective::CRC32::Checksum
8) [C0026.002] Data Micro-objective::XOR::Encode Data
9) [C0030.001] Data Micro-objective::MurmurHash::Non-Cryptographic Hash
11) [B0013.001] Discovery::Process detection
12) [C0046] File System Micro-objective::Create Directory
13) [C0048] File System Micro-objective::Delete Directory
14) [C0047] File System Micro-objective::Delete File
15) [C0049] File System Micro-objective::Get File Attributes
16) [C0051] File System Micro-objective::Read File
17) [C0050] File System Micro-objective::Set File Attributes
18) [C0052] File System Micro-objective::Writes File
19) [C0034.001] Operating System Micro-objective::Set Variable::Environment Variable
20) [C0036.004] Operating System Micro-objective::Create Registry Key::Registry
21) [C0036.003] Operating System Micro-objective::Open Registry Key::Registry
22) [C0036.006] Operating System Micro-objective::Query Registry Value::Registry
23) [C0036.001] Operating System Micro-objective::Set Registry Key::Registry
24) [C0040] Process Micro-objective::Allocate Thread Local Storage
25) [C0017] Process Micro-objective::Create Process
26) [C0038] Process Micro-objective::Create Thread
27) [C0041] Process Micro-objective::Set Thread Local Storage Value
28) [C0018] Process Micro-objective::Terminate Process