MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fdafb44be84ea918c76a99f4c24c08fbe8de6648a4ad73614f77450aa2b43484. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TVRat


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: fdafb44be84ea918c76a99f4c24c08fbe8de6648a4ad73614f77450aa2b43484
SHA3-384 hash: c27e8cadb594d416a00833ca5fa73762137dfdb698e93e2f62263da2e08831d3bef8adb1bdb2676d45fbff8aeaf3ddaf
SHA1 hash: f7cc152f814db7bec37176cc3bcefc7e7dcb368a
MD5 hash: 86fefc543bf37ed25542b7b3a5d9fe82
humanhash: robert-rugby-alaska-speaker
File name:SecuriteInfo.com.Trojan.Siggen9.49657.19102.26803
Download: download sample
Signature TVRat
File size:4'573'676 bytes
First seen:2020-05-28 20:43:22 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 25890460a2b98652bed7ba240be2c1d7 (3 x TVRat, 1 x AsyncRAT, 1 x Socks5Systemz)
ssdeep 49152:IEdLZjkymP8DEovU85BuTAdMg1khFtPfFwyUF1EJr8z6JsGRMbGQDCDSj0vw30fo:IWkTTsjdsfdzM1cqTGR6DL7cyr
Threatray 17 similar samples on MalwareBazaar
TLSH 31263307DBAC8C3BE28453703C758CB3EDEB75593C758A8C224B24BD590E6616E4DA1B
Reporter SecuriteInfoCom
Tags:TVRat

Code Signing Certificate

Organisation:Symantec Time Stamping Services CA - G2
Issuer:Thawte Timestamping CA
Algorithm:sha1WithRSAEncryption
Valid from:Dec 21 00:00:00 2012 GMT
Valid to:Dec 30 23:59:59 2020 GMT
Serial number: 7E93EBFB7CC64E59EA4B9A77D406FC3B
Intelligence: 85 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 0625FEE1A80D7B897A9712249C2F55FF391D6661DBD8B87F9BE6F252D88CED95
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
100
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Therat
Status:
Malicious
First seen:
2020-05-25 18:42:11 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
18 of 31 (58.06%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence spyware
Behaviour
Enumerates system info in registry
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Adds Run key to start application
JavaScript code in executable
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TVRat

Executable exe fdafb44be84ea918c76a99f4c24c08fbe8de6648a4ad73614f77450aa2b43484

(this sample)

Comments