MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ff5d04582ebc24f95416e178c35178b30db559438b66848afe8038e4028c07ab. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FinderBot


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments 1

SHA256 hash: ff5d04582ebc24f95416e178c35178b30db559438b66848afe8038e4028c07ab
SHA3-384 hash: eecaa6019c60716833522c8048aae98e3954567514b73c260437ea9c4e54ba2df913f1ce062ed1241b7bddda72a57e59
SHA1 hash: 9595e11755334331cd7e27785b5c32eb8d9d7a75
MD5 hash: 862207538f0dfc88d7854b9ee3d396fd
humanhash: pluto-mango-failed-magnesium
File name:862207538f0dfc88d7854b9ee3d396fd.exe
Download: download sample
Signature FinderBot
File size:8'462'126 bytes
First seen:2021-04-18 07:26:05 UTC
Last seen:2021-04-18 07:44:39 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash eb5bc6ff6263b364dfbfb78bdb48ed59 (54 x Adware.Generic, 18 x RaccoonStealer, 8 x Adware.ExtenBro)
ssdeep 98304:AX4KRSzxAGu4focP1VSFCdSb9wz7qZk+R2brkddlSNnXBL2qV6l7NScoyB+4F3fC:+TAzxArOP1VSEWrs/IUNxC/cy+gXSd/3
TLSH 52862367B198A53EC46E37364673A01058FBE67DE426BE1676E0C8CCCF660C01E3A765
Reporter abuse_ch
Tags:exe FinderBot

Intelligence


File Origin
# of uploads :
2
# of downloads :
122
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
862207538f0dfc88d7854b9ee3d396fd.exe
Verdict:
No threats detected
Analysis date:
2021-04-18 07:28:15 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a process from a recently created file
Searching for the window
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
DNS request
Delayed reading of the file
Sending a UDP request
Running batch commands
Creating a process with a hidden window
Launching a process
Creating a service
Deleting a recently created file
Creating a file in the Windows subdirectories
Launching a service
Sending an HTTP GET request
Creating a file
Creating a file in the %temp% subdirectories
Sending a TCP request to an infection source
Enabling autorun for a service
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
76 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Behaviour
Behavior Graph:
Gathering data
Verdict:
malicious
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery spyware stealer
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-04-18 08:15:41 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0001.032] Anti-Behavioral Analysis::Timing/Delay Check GetTickCount
1) [B0009.029] Anti-Behavioral Analysis::Instruction Testing
2) [B0009] Anti-Behavioral Analysis::Virtual Machine Detection
3) [C0027.009] Cryptography Micro-objective::RC4::Encrypt Data
4) [C0021.004] Cryptography Micro-objective::RC4 PRGA::Generate Pseudo-random Sequence
5) [C0021] Cryptography Micro-objective::Generate Pseudo-random Sequence
6) [C0032.001] Data Micro-objective::CRC32::Checksum
7) [C0026.002] Data Micro-objective::XOR::Encode Data
9) [C0046] File System Micro-objective::Create Directory
10) [C0048] File System Micro-objective::Delete Directory
11) [C0047] File System Micro-objective::Delete File
12) [C0049] File System Micro-objective::Get File Attributes
13) [C0052] File System Micro-objective::Writes File
14) [C0007] Memory Micro-objective::Allocate Memory
15) [C0036.004] Operating System Micro-objective::Create Registry Key::Registry
16) [C0036.003] Operating System Micro-objective::Open Registry Key::Registry
17) [C0036.006] Operating System Micro-objective::Query Registry Value::Registry
18) [C0017.003] Process Micro-objective::Create Suspended Process::Create Process
19) [C0017] Process Micro-objective::Create Process
20) [C0038] Process Micro-objective::Create Thread
21) [C0041] Process Micro-objective::Set Thread Local Storage Value
22) [C0055] Process Micro-objective::Suspend Thread
23) [C0018] Process Micro-objective::Terminate Process