MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fa2305975aded0fd0601fdab3013f8877969cb873fb9620b4d65ac6ff3b25522. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA 1 File information Comments

SHA256 hash: fa2305975aded0fd0601fdab3013f8877969cb873fb9620b4d65ac6ff3b25522
SHA3-384 hash: bb2c6df28f546d37559dd3b35dddc15e2612e82ddbfe5ae1df499b7a627f2b64a58600f74f922f37cfb8a9b42bd0e850
SHA1 hash: 003f46f74bbfc44ffd7f3ebfec67c80cf0a07bbf
MD5 hash: 24b90157056913bef8c90b6319164afe
humanhash: twelve-august-princess-texas
File name:file.exe
Download: download sample
File size:293'621 bytes
First seen:2020-05-22 07:33:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 027ea80e8125c6dda271246922d4c3b0 (10 x njrat, 7 x DCRat, 5 x DarkComet)
ssdeep 6144:msCwu+mWhJifvtNP/7YXSLB80PgWUGFLuhR3pOf+wy:bxmIJQvPkitVCR3pOfG
Threatray 255 similar samples on MalwareBazaar
TLSH 8D54B002F7C284F2D9721831492EAB14A67CBD301E14CA6FBBD47D6DDA710916336EA3
Reporter abuse_ch
Tags:exe RAT


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: del1.i.mail.ru
Sending IP: 217.69.138.183
From: Первый МГМУ им. И.М. Сеченова <govorov.nikolya@list.ru>
Subject: Нож в спину Трампа
Attachment: file.rar (contains "file.exe")

Unknown RAT C2:
bamo.ocry.com:8433 (207.148.126.141)

Intelligence


File Origin
# of uploads :
1
# of downloads :
79
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Blocker
Status:
Malicious
First seen:
2020-05-22 07:36:58 UTC
File Type:
PE (Exe)
Extracted files:
34
AV detection:
22 of 48 (45.83%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
macro persistence
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Checks processor information in registry
Enumerates system info in registry
Modifies registry class
Office loads VBA resources, possible macro or embedded object present
Drops file in Program Files directory
Drops file in Windows directory
Modifies service
Loads dropped DLL
Executes dropped EXE
Sets DLL path for service in the registry
Suspicious Office macro
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:SharedStrings
Author:Katie Kleemola
Description:Internal names found in LURK0/CCTV0 samples

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe fa2305975aded0fd0601fdab3013f8877969cb873fb9620b4d65ac6ff3b25522

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments