MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fc00ea7ef331265218e64f035bd729c59131d237326e0fc76d0e7572c0220276. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: fc00ea7ef331265218e64f035bd729c59131d237326e0fc76d0e7572c0220276
SHA3-384 hash: 6f2c48986a4333013f1181fec7491884695402fa2be8432af639288fecaaa38e3d4db9770f22f35abbcdbcc8173bea06
SHA1 hash: 65de53d0e4da431838e4f8dce1a6e9794adc8618
MD5 hash: 38e5a49f42946529e1c9831b998de023
humanhash: thirteen-spring-speaker-west
File name:38e5a49f42946529e1c9831b998de023.exe
Download: download sample
File size:50'392 bytes
First seen:2020-10-13 10:42:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'602 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 768:kSqSAKJ07YlcZ2+JoJr+BKqygqDozCTrQIfPCw4Uf2hx:kSEscZ2+JoJr+BKqygqDo2TnPCw4Ufg
TLSH 9C333100E2EBC994FD36F7B03697818AD5B758A2EF23E7E509891E917463304DF1394A
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
96
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Launching a process
Creating a process with a hidden window
DNS request
Sending a custom TCP request
Creating a file
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
A
b
c
d
e
f
i
l
M
n
o
r
S
t
u
V
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 297240 Sample: nQCOKkVhSo.exe Startdate: 13/10/2020 Architecture: WINDOWS Score: 48 26 Multi AV Scanner detection for submitted file 2->26 8 nQCOKkVhSo.exe 15 3 2->8         started        process3 dnsIp4 22 us-east-1.route-1.000webhost.awex.io 145.14.145.94, 443, 49735 AWEXUS Netherlands 8->22 24 semestral-halls.000webhostapp.com 8->24 20 C:\Users\user\AppData\...\nQCOKkVhSo.exe.log, ASCII 8->20 dropped 12 timeout.exe 1 8->12         started        file5 process6 process7 14 MpCmdRun.exe 1 12->14         started        16 conhost.exe 12->16         started        process8 18 conhost.exe 14->18         started       
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Suspicious
First seen:
2020-10-13 09:59:51 UTC
AV detection:
19 of 48 (39.58%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Delays execution with timeout.exe
Modifies system certificate store
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
fc00ea7ef331265218e64f035bd729c59131d237326e0fc76d0e7572c0220276
MD5 hash:
38e5a49f42946529e1c9831b998de023
SHA1 hash:
65de53d0e4da431838e4f8dce1a6e9794adc8618
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments