MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fd6e4c2a55917b0cf5728ba5413959dd4fc256d3e94d8d97bf380af4816fd227. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments 1

SHA256 hash: fd6e4c2a55917b0cf5728ba5413959dd4fc256d3e94d8d97bf380af4816fd227
SHA3-384 hash: 4ce1000e2954f7559e6729b6267521c228c22deaf74c4ebb7c9c637e45d217581a02f4f34ccc3fb44f2f0d1913227852
SHA1 hash: b9e9a52c78dbc09cd26ef96acc238168343dcac7
MD5 hash: 4b0608ca433cae47d84f284681cf6b0f
humanhash: fish-golf-queen-illinois
File name:4b0608ca433cae47d84f284681cf6b0f
Download: download sample
File size:1'628'584 bytes
First seen:2022-07-07 11:03:03 UTC
Last seen:2022-07-07 12:15:31 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b0653422fddffc2be35813b9ec08a6fd
ssdeep 49152:lEDzo+dLDbfzqeOmvSmzZ6G0ms+TBNh2Xrg:lEDU+dntMGrpTB+r
TLSH T1AC751210AE90D4B4D96392B069AFA359F5387D605B2440CB53D87AE90BF1FF1EC3069B
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon f28b0fb3b3b392d2
Reporter zbetcheckin
Tags:32 exe signed

Code Signing Certificate

Organisation:www.artweaver.de
Issuer:R3
Algorithm:sha256WithRSAEncryption
Valid from:2022-05-23T09:32:40Z
Valid to:2022-08-21T09:32:39Z
Serial number: 03bb38e009072b417bf8459d28b7b3d18d33
Intelligence: 6 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 37897b3bca6395ae9fdca39b090268b44355e220f4ede39eb934dc8ab9b87561
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
232
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
210c8271902f2984572936ee45db20f842841269c287c4e7e74996df91dff3ae.zip
Verdict:
Malicious activity
Analysis date:
2022-07-05 13:58:27 UTC
Tags:
loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Launching a process
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
MeasuringTime
SystemUptime
EvasionQueryPerformanceCounter
EvasionGetTickCount
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware overlay packed wacatac
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Contains functionality to hide a thread from the debugger
Contains functionality to hide user accounts
Creates a thread in another existing process (thread injection)
Drops PE files to the document folder of the user
Encrypted powershell cmdline option found
Found C&C like URL pattern
Hides threads from debuggers
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for sample
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Potential dropper URLs found in powershell memory
Potentially malicious time measurement code found
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 658838 Sample: 9iS0Klp0Nw Startdate: 07/07/2022 Architecture: WINDOWS Score: 100 50 Snort IDS alert for network traffic 2->50 52 Multi AV Scanner detection for domain / URL 2->52 54 Antivirus detection for URL or domain 2->54 56 10 other signatures 2->56 9 9iS0Klp0Nw.exe 2->9         started        process3 signatures4 68 Writes to foreign memory regions 9->68 70 Allocates memory in foreign processes 9->70 72 Injects a PE file into a foreign processes 9->72 12 InstallUtil.exe 1 9->12         started        process5 dnsIp6 48 193.233.193.67, 49854, 49855, 49858 FREE-NET-ASFREEnetEU Russian Federation 12->48 74 Writes to foreign memory regions 12->74 76 Allocates memory in foreign processes 12->76 78 Tries to detect virtualization through RDTSC time measurements 12->78 80 5 other signatures 12->80 16 dllhost.exe 6 12->16         started        signatures7 process8 dnsIp9 46 192.168.2.1 unknown unknown 16->46 44 C:\Users\user\...\4BB26E10F5D0271601776.exe, PE32 16->44 dropped 58 Drops PE files to the document folder of the user 16->58 60 Injects code into the Windows Explorer (explorer.exe) 16->60 62 Uses schtasks.exe or at.exe to add and modify task schedules 16->62 64 2 other signatures 16->64 21 cmd.exe 1 16->21         started        24 cmd.exe 1 16->24         started        26 schtasks.exe 1 16->26         started        28 4 other processes 16->28 file10 signatures11 process12 signatures13 66 Encrypted powershell cmdline option found 21->66 30 powershell.exe 19 21->30         started        32 conhost.exe 21->32         started        34 powershell.exe 10 24->34         started        36 conhost.exe 24->36         started        38 conhost.exe 26->38         started        40 conhost.exe 28->40         started        42 conhost.exe 28->42         started        process14
Threat name:
Win32.Adware.RedCap
Status:
Malicious
First seen:
2022-07-07 07:57:21 UTC
File Type:
PE (Exe)
Extracted files:
27
AV detection:
15 of 26 (57.69%)
Threat level:
  1/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Unpacked files
SH256 hash:
366d862faccabc38f019a167a985f9f5c401036d77b5dbf649d2a722b5fc1ab7
MD5 hash:
d2f4510014b0bb7f41407d5db8bef961
SHA1 hash:
5255aa456e4f34a2f03b8d9112ba2c194b1d7cb1
SH256 hash:
e4311f85471a0e3cafc58accc6b0f442075bff064c30951f2eba89db5546dcbe
MD5 hash:
9fd978bd536d31212aa75659a30d6d51
SHA1 hash:
f10c21992add6d3750de8d72ea8ad8b5295611b9
SH256 hash:
fd6e4c2a55917b0cf5728ba5413959dd4fc256d3e94d8d97bf380af4816fd227
MD5 hash:
4b0608ca433cae47d84f284681cf6b0f
SHA1 hash:
b9e9a52c78dbc09cd26ef96acc238168343dcac7
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe fd6e4c2a55917b0cf5728ba5413959dd4fc256d3e94d8d97bf380af4816fd227

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-07-07 11:03:08 UTC

url : hxxp://193.233.193.67/FrutiLoopsB.exe