MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fbcb04303844d9183f1fb53081fefeb9794eb011c9d0adb855407d6e22fde857. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazarCall


Vendor detections: 5


Intelligence 5 IOCs YARA 2 File information Comments

SHA256 hash: fbcb04303844d9183f1fb53081fefeb9794eb011c9d0adb855407d6e22fde857
SHA3-384 hash: b900a1634763784e9700c4978c0fc1ef1226559f21e137746165b657367fce518ec5991dd942182ca5e4e5916acd516b
SHA1 hash: 195e3f11e5f0f0c96ea6a5b24cbe0897127d5d28
MD5 hash: b10749161376d91514916578871960d2
humanhash: river-nitrogen-nevada-iowa
File name:SecuriteInfo.com.Program.Win32.Wacapew.Cml.8809.13166
Download: download sample
Signature BazarCall
File size:716'206 bytes
First seen:2021-03-27 00:39:32 UTC
Last seen:2021-04-01 03:28:51 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 31133004d7ae5cf3ee0768604032eeba (1 x BazarCall, 1 x BazaLoader)
ssdeep 12288:JuzxYNn/76oFZDH91fWzfHpOF3QjEL4nzbbqEF4+E7ZFEy8W:czxK/7j/Dd1fWLO3QjE8zbbDK+kFEy8W
Threatray 120 similar samples on MalwareBazaar
TLSH 44E47C1462896372F4D104B176FE4978E47F3239533E59D3F19CA6043368EE2A37AA1B
Reporter SecuriteInfoCom
Tags:BazarCall

Intelligence


File Origin
# of uploads :
4
# of downloads :
203
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Program.Win32.Wacapew.Cml.8809.13166
Verdict:
No threats detected
Analysis date:
2021-03-27 00:41:33 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Creating a process with a hidden window
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
Allocates memory in foreign processes
Creates multiple autostart registry keys
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Sample uses process hollowing technique
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Uses cmd line tools excessively to alter registry or file data
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 376767 Sample: SecuriteInfo.com.Program.Wi... Startdate: 27/03/2021 Architecture: WINDOWS Score: 92 77 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->77 79 Multi AV Scanner detection for submitted file 2->79 12 SecuriteInfo.com.Program.Win32.Wacapew.Cml.8809.exe 2->12         started        14 cmd.exe 1 2->14         started        17 cmd.exe 1 2->17         started        19 2 other processes 2->19 process3 signatures4 21 cmd.exe 1 12->21         started        101 Uses cmd line tools excessively to alter registry or file data 14->101 24 reg.exe 1 1 14->24         started        26 MIH2804.exe 14->26         started        28 conhost.exe 14->28         started        30 MIH2804.exe 17->30         started        32 conhost.exe 17->32         started        34 reg.exe 1 17->34         started        process5 signatures6 81 Uses ping.exe to sleep 21->81 83 Uses cmd line tools excessively to alter registry or file data 21->83 85 Uses ping.exe to check the status of other devices and networks 21->85 36 SecuriteInfo.com.Program.Win32.Wacapew.Cml.8809.exe 1 21->36         started        39 conhost.exe 21->39         started        41 PING.EXE 1 21->41         started        87 Creates multiple autostart registry keys 24->87 process7 file8 69 C:\Users\user\AppData\Local\...\MIH2804.exe, PE32+ 36->69 dropped 43 cmd.exe 1 36->43         started        46 conhost.exe 39->46         started        process9 signatures10 91 Uses ping.exe to sleep 43->91 48 MIH2804.exe 1 43->48         started        51 conhost.exe 43->51         started        53 PING.EXE 1 43->53         started        process11 signatures12 75 Creates multiple autostart registry keys 48->75 55 cmd.exe 1 48->55         started        process13 signatures14 89 Uses ping.exe to sleep 55->89 58 MIH2804.exe 1 55->58         started        62 conhost.exe 55->62         started        64 PING.EXE 1 55->64         started        process15 dnsIp16 73 18.134.73.79, 443, 49705 AMAZON-02US United States 58->73 93 Writes to foreign memory regions 58->93 95 Allocates memory in foreign processes 58->95 97 Modifies the context of a thread in another process (thread injection) 58->97 99 2 other signatures 58->99 66 chrome.exe 1 58->66         started        signatures17 process18 dnsIp19 71 18.202.16.187, 443, 49708, 49711 AMAZON-02US United States 66->71
Threat name:
Win64.Malware.Generic
Status:
Suspicious
First seen:
2021-03-26 23:30:21 UTC
AV detection:
5 of 29 (17.24%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
persistence
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Suspicious use of NtCreateUserProcessOtherParentProcess
Unpacked files
SH256 hash:
fbcb04303844d9183f1fb53081fefeb9794eb011c9d0adb855407d6e22fde857
MD5 hash:
b10749161376d91514916578871960d2
SHA1 hash:
195e3f11e5f0f0c96ea6a5b24cbe0897127d5d28
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_KB_CERT_06aea76bac46a9e8cfe6d29e45aaf033
Author:ditekSHen
Description:Detects executables signed with stolen, revoked or invalid certificates
Rule name:INDICATOR_KB_CERT_0c15be4a15bb0903c901b1d6c265302f
Author:ditekSHen
Description:Detects executables signed with stolen, revoked or invalid certificates

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

BazarCall

Executable exe fbcb04303844d9183f1fb53081fefeb9794eb011c9d0adb855407d6e22fde857

(this sample)

  
Delivery method
Distributed via web download

Comments