MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ff95e6d148e53e60b113f05bb54557315ec9b8af82adfaa276a21fbc561a9b77. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Conti


Vendor detections: 12


Intelligence 12 IOCs YARA 16 File information Comments

SHA256 hash: ff95e6d148e53e60b113f05bb54557315ec9b8af82adfaa276a21fbc561a9b77
SHA3-384 hash: 839c86da080cf2fbd0a49ca25fc31f6faba67803b88e53756822cd16225082229cedced2c1bf7a5ff4ab49c360384caa
SHA1 hash: 90dd8718560a23faddf99e64b52175d1d765397c
MD5 hash: 02fde0d62506c483203c5e67490893b5
humanhash: pennsylvania-november-winter-sweet
File name:SecuriteInfo.com.Win32.Trojan.Agent.Y9G4LF.22316.31666
Download: download sample
Signature Conti
File size:2'143'744 bytes
First seen:2023-12-03 16:32:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4f2f006e2ecf7172ad368f8289dc96c1 (40 x LummaStealer, 20 x SalatStealer, 17 x CobaltStrike)
ssdeep 24576:NORYyhYuBiYaC+3DGX1eAxjfTtRRO8DsU6wjy9gnv2WVqqSQVNPVF7M1Ut0096TQ:N6MDUsq18TPI
Threatray 3 similar samples on MalwareBazaar
TLSH T162A52950FDEB84F2E4431932445BB27F67245E054F3ADB9BEB807A6EF8332960936245
TrID 45.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.4% (.EXE) Win64 Executable (generic) (10523/12/4)
9.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.6% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter SecuriteInfoCom
Tags:conti exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
438
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a custom TCP request
Launching many processes
Using the Windows Management Instrumentation requests
Searching for the window
Launching a tool to kill processes
Launching the process to interact with network services
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive golang greyware ransomware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Conti, Gocoder, Kuiper, Python Ransomwar
Detection:
malicious
Classification:
rans.troj.evad.spre
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
Clears the windows event log
Deletes shadow drive data (may be related to ransomware)
Disables security and backup related services
Disables the windows security center
Encrypted powershell cmdline option found
Excessive usage of taskkill to terminate processes
Found ransom note / readme
Machine Learning detection for sample
May encrypt documents and pictures (Ransomware)
Multi AV Scanner detection for submitted file
Potential dropper URLs found in powershell memory
Suspicious powershell command line found
Uses bcdedit to modify the Windows boot settings
Writes a notice file (html or txt) to demand a ransom
Writes many files with high entropy
Yara detected Conti ransomware
Yara detected Gocoder ransomware
Yara detected Kuiper Ransomware
Yara detected Python Ransomware
Yara detected RansomwareGeneric
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1352695 Sample: SecuriteInfo.com.Win32.Troj... Startdate: 03/12/2023 Architecture: WINDOWS Score: 100 66 Antivirus detection for URL or domain 2->66 68 Multi AV Scanner detection for submitted file 2->68 70 Found ransom note / readme 2->70 72 6 other signatures 2->72 9 SecuriteInfo.com.Win32.Trojan.Agent.Y9G4LF.22316.31666.exe 502 2->9         started        process3 file4 58 C:\Program Files\Mozilla Firefox\...\omni.ja, data 9->58 dropped 60 C:\...\webcompat@mozilla.org.xpi, data 9->60 dropped 62 C:\Program Files\...\initial_preferences, data 9->62 dropped 64 76 other malicious files 9->64 dropped 86 Clears the windows event log 9->86 88 Deletes shadow drive data (may be related to ransomware) 9->88 90 Writes a notice file (html or txt) to demand a ransom 9->90 92 6 other signatures 9->92 13 cmd.exe 1 9->13         started        16 cmd.exe 1 9->16         started        18 cmd.exe 1 9->18         started        20 62 other processes 9->20 signatures5 process6 signatures7 94 Suspicious powershell command line found 13->94 96 Encrypted powershell cmdline option found 13->96 22 powershell.exe 12 13->22         started        98 Deletes shadow drive data (may be related to ransomware) 16->98 100 Bypasses PowerShell execution policy 16->100 102 Excessive usage of taskkill to terminate processes 18->102 25 taskkill.exe 1 18->25         started        27 net.exe 20->27         started        29 net.exe 20->29         started        31 net.exe 20->31         started        33 23 other processes 20->33 process8 signatures9 82 Suspicious powershell command line found 22->82 84 Encrypted powershell cmdline option found 22->84 35 powershell.exe 22->35         started        38 net1.exe 27->38         started        40 net1.exe 29->40         started        42 net1.exe 31->42         started        44 net1.exe 33->44         started        46 net1.exe 33->46         started        48 net1.exe 33->48         started        process10 signatures11 74 Clears the windows event log 35->74 76 Excessive usage of taskkill to terminate processes 35->76 78 Potential dropper URLs found in powershell memory 35->78 80 Disables security and backup related services 35->80 50 conhost.exe 35->50         started        52 taskkill.exe 35->52         started        54 taskkill.exe 35->54         started        56 3 other processes 35->56 process12
Threat name:
Win32.Ransomware.LockBit
Status:
Malicious
First seen:
2023-12-01 20:59:25 UTC
File Type:
PE (Exe)
AV detection:
9 of 37 (24.32%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion ransomware spyware stealer
Behaviour
Interacts with shadow copies
Kills process with taskkill
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Drops file in Program Files directory
Drops desktop.ini file(s)
Drops startup file
Reads user/profile data of web browsers
Clears Windows event logs
Deletes shadow copies
Renames multiple (2094) files with added filename extension
Renames multiple (2827) files with added filename extension
Unpacked files
SH256 hash:
ff95e6d148e53e60b113f05bb54557315ec9b8af82adfaa276a21fbc561a9b77
MD5 hash:
02fde0d62506c483203c5e67490893b5
SHA1 hash:
90dd8718560a23faddf99e64b52175d1d765397c
Detections:
INDICATOR_SUSPICIOUS_GENRansomware
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CMD_Shutdown
Author:adm1n_usa32
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:GoBinTest
Rule name:golang
Rule name:Golangmalware
Author:Dhanunjaya
Description:Malware in Golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:HiveRansomware
Author:Dhanunjaya
Description:Yara Rule To Detect Hive V4 Ransomware
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:INDICATOR_SUSPICIOUS_GENRansomware
Author:ditekSHen
Description:detects command variations typically used by ransomware
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments